Google security researchers have come to the conclusion that speculative execution attacks are here to stay [tomshardware.com] without drastic changes to modern CPU architectures, such as removing speculative execution entirely.
Spectre is here to stay: An analysis of side-channels and speculative execution [arxiv.org]
Related:
Patch for Intel Speculative Execution Vulnerability Could Reduce Performance by 5 to 35% [Update: 2] [soylentnews.org]
Qualcomm Joins Others in Confirming its CPUs Suffer From Spectre, and Other Meltdown News [soylentnews.org]
Congress Questions Chipmakers About Meltdown and Spectre [soylentnews.org]
What Impact Has Meltdown/Spectre Had on YOUR Systems? [soylentnews.org]
Intel Admits a Load of its CPUs Have Spectre V2 Flaw That Can't be Fixed [soylentnews.org]
Intel FPU Speculation Vulnerability Confirmed [soylentnews.org]
New Spectre Variant SpectreRSB Targets Return Stack Buffer [soylentnews.org]
Intel Discloses a Speculative Execution Attack in Software Guard eXtensions (SGX) [soylentnews.org]
Intel 'Gags' Linux Distros From Revealing Performance Hit From Spectre Patches [soylentnews.org]
MIT Researchers Claim to Have a Solution for Some Speculative Execution Attacks [soylentnews.org]
Spectre, Meltdown Researchers Unveil 7 More Speculative Execution Attacks [soylentnews.org]
New Side-Channel Leak: Researchers Attack Operating System Page Caches [soylentnews.org]