{"id":4875,"date":"2018-02-16T04:14:46","date_gmt":"2018-02-15T20:14:46","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/vsnews\/?p=4875"},"modified":"2018-02-16T04:14:46","modified_gmt":"2018-02-15T20:14:46","slug":"h3hcq1","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/vsnews\/akams-h3hcq1\/","title":{"rendered":"Spectre mitigations in MSVC (C++ team blog)"},"content":{"rendered":"<p>Microsoft is aware of a new publicly disclosed class of vulnerabilities, called \u201cspeculative execution side-channel attacks,\u201d that affect many operating systems and modern processors, including processors from Intel, AMD, and ARM. On the MSVC team, we\u2019ve reviewed information in detail and conducted extensive tests, which showed the performance impact of the new \/Qspectre switch to be negligible. This post is intended as a follow-up to Terry Myerson\u2019s recent Windows System post with a focus on the assessment for MSVC. If you haven\u2019t had a chance to read Terry\u2019s post you should take a moment to read it before reading this one. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is aware of a new publicly disclosed class of vulnerabilities, called \u201cspeculative execution side-channel attacks,\u201d that affect many operating systems and modern processors, including processors from Intel, AMD, and ARM. On the MSVC team, we\u2019ve reviewed information in detail and conducted extensive tests, which showed the performance impact of the new \/Qspectre switch to [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":8227,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allskus"],"acf":[],"blog_post_summary":"<p>Microsoft is aware of a new publicly disclosed class of vulnerabilities, called \u201cspeculative execution side-channel attacks,\u201d that affect many operating systems and modern processors, including processors from Intel, AMD, and ARM. On the MSVC team, we\u2019ve reviewed information in detail and conducted extensive tests, which showed the performance impact of the new \/Qspectre switch to [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/posts\/4875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/comments?post=4875"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/posts\/4875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/media\/8227"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/media?parent=4875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/categories?post=4875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/vsnews\/wp-json\/wp\/v2\/tags?post=4875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}