We performed these experiments on three
recent Intel processors: i5-6200U based on Skylake microar-
chitecture, i7-4800MQ based on Haswell microarchitecture
and i7-2600 based on Sandy Bridge Microarchitecture.
We anticipate that existing software mitigations for previously known side channel exploits, such as the use of side channel resistant cryptography, will be similarly effective against the method described in this paper.
Intel 认为现有的对Meltdown 的软件措施对BranchScope一样有效。
One possible mitigation technique is to algorithmically
remove dependencies of branch outcomes on secret data