- Report: Jun 1, 2017
- Credit:
- Jann Horn (Google Project Zero)
- Paul Kocher in collaboration with, in alphabetical order, Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus), Moritz Lipp (Graz University of Technology), and Yuval Yarom (University of Adelaide and Data61)
- Eugnis/spectre-attack - Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
- HarsaroopDhillon/SpectreExploit - SpectreExploit POC
- Spectre
- Reading privileged memory with a side-channel
- marcan/speculation-bugs
- A Simple Explanation of the Differences Between Meltdown and Spectre
- Intel: Intel Responds to Security Research Findings
- Negative Result: Reading Kernel Memory From User Mode
- History stealing using timing attack
- CVE-2017-5753