AMD’s Mark Papermaster Talk Processors, Meltdown, Spectre, and more – Interview at CES 2018



AMD’s Mark Papermaster talks about AMD processors and how AMD teamed up with competitors and OS developers to tackle the Meltdown and Spectre security flaw found in CPUs last year.

GET UP-TO-THE-MINUTE COVERAGE OF CES 2018 BELOW:
https://www.digitaltrends.com/ces/

SUBSCRIBE FOR THE LATEST VIDEOS
http://bit.ly/DTYouTubeSub

VISIT DIGITAL TRENDS
http://www.digitaltrends.com/

DT Daily: https://www.youtube.com/playlist?list=PL8110CBCACD741FEC
DT Originals: https://www.youtube.com/playlist?list=PLEA870D36335F60D2
DT Podcasts: https://www.youtube.com/playlist?list=PLZEIwIHCxaFVemFMYm9Uqixqt7RxRJnhf

FOLLOW US!
https://www.facebook.com/digitaltrends

https://www.instagram.com/digitaltrends
https://plus.google.com/+digitaltrends/posts

source

9 thoughts on “AMD’s Mark Papermaster Talk Processors, Meltdown, Spectre, and more – Interview at CES 2018

  • January 11, 2018 at 6:21 pm
    Permalink

    Great losing raja he is jumping ship. Vega now will get better

  • January 12, 2018 at 2:34 am
    Permalink

    Lol, wasn't that funny, he choked on his words the very moment he said you can play triple AAA games with it. Hahahaha, I hope that wasn't a subconscious guilty emotion trying to shut himself up. I just found that part of the video to be funny.

  • January 15, 2018 at 2:10 pm
    Permalink

    Variant 1 Spectre can infect both Intel and AMD but the difference is that for AMD system to be infected and exploited (a hacker) has to at least once sit behind the AMD based computer physically prior to attacking it later on remote. (Unlikely) Whereas on Intel based systems he doesn't (The hacker) does not have to be physically present and can be hacked thought the internet. This is why AMD says near zero risk to AMD processors at this time. So if you have AMD unless you let the hacker in to your house, office or data center you cannot be hacked. But if you are on INTEL well you have a problem.
    AMD is vulnerable to variant 2 Spectre in that the exploitation risk is not zero, but certain differences in its architecture make Spectre harder to exploit. The main difference here is that AMD uses full address tags in its branch prediction cache where as Intel uses only partial tags. So, on Intel it is relatively easy for a user program to corrupt the branch prediction cache for selected kernel addresses, whereas on AMD it is nearly impossible. However, that isn't to say that the risk is zero. AMD believes that it does not need to implement the IBRS mess that Intel has implemented. That means that three of the five mitigation techniques are not necessary on AMD.
    By its very design, AMD is almost completely immune; as it possesses a unique architecture that Spectre has only a miniscule chance at ever penetrating into an AMD Zen CPU. It is Intel that has huge vulnerability problems and has sloppily designed horrid patches that are creating huge problems when applied. AMD switched to a different kind of branch predictor in Zen (like Samsung in its Exynos ARM processors, AMD is using simple neural network components called perceptron’s), and the company happened to pick a design that was protected against this problem."

  • February 5, 2018 at 7:14 pm
    Permalink

    Wait… What the fuck. AMD actually worked on the problem instead of panicking about Thread-ripper and releasing a botched i9, selling off stock and finally starting on a patch and rushing it out only once it became public… Shocking.

  • March 19, 2018 at 6:48 pm
    Permalink

    AMD needs a competitive mid-high to high performance GPU. 580 is end of the line…then nothing ! And they use way too much power.

  • March 19, 2018 at 6:49 pm
    Permalink

    If I could afford Vega…my lights would dim it sucks so much power.

Comments are closed.