New White Paper: Securing SoCs with eSecure HRoT from Silex Insight and Tortuga Logic’s Radix-S | Read It Now!

Microarchitectural Side
Channels Security Verification

Even if a system’s software is perfectly secure, the complex interactions between the system’s hardware and the physical world need to be properly understood. A side-channel is an indirect leakage of information caused by unexpected side effects during the operation of the system. Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed.


Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets

CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre maintained by MITRE.


Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.

CVE-2017-5754 is the official reference to Meltdown maintained by MITRE.

To learn more download the
Radix-M data sheet