Изменения рейтингов за последние раунды временно удалены. Скоро они будут возвращены. ×

Meltdown + spectre vs testing systems

Правка en1, от Golovanov399, 2018-01-09 11:44:33

Hello everyone,

Some of you may know about recently discovered vulnerabilities (well, technically, there in one vulnerability and two attacks using it). I am not a cybersecurity expert, I know what is going on about the "read-all-those-breaking-news-titles" level, but as I understood, some things can slow down by 30%. So I have a couple of questions:

  1. Do testing systems like codeforces, yandex.contest, topcoder, atcoder, csacademy etc apply the patch? I don't know if testing machines store something that is important and shouldn't be stolen.

  2. If yes, does this mean that we now should multiply all time limits by 0.7? Maybe this coefficient is not so small because 30% is reached on some other type of operations which are not used in cp? On the other hand, branch prediction is used almost always in cp, as I know.

Somebody who knows how this works, answer, please.

Теги security, meltdown, spectre, performance


  Rev. Язык Кто Когда Δ Комментарий
en1 Английский Golovanov399 2018-01-09 11:44:33 1023 Initial revision (published)