-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Testspec: Valgrind CT::poison() overview #255
base: main
Are you sure you want to change the base?
Conversation
034a1a8
to
a25e464
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice! I like this description. Especially the example gives a good intuition about Valgrind. I left some comments, mainly to make my Grammarly license worth it.
* **Results are not easily generalizable** | ||
|
||
Valgrind detects secret-dependent execution patterns in a specific binary | ||
that was generated with certain compiler flags and for a concrete hardware |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that was generated with certain compiler flags and for a concrete hardware | |
that was generated with certain compiler flags and for concrete hardware |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I disagree here. The point is that it is "one specific concrete hardware", no?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well, the phase continues in the next line:
... and for [a] concrete hardware platform.
Co-Authored-By: Fabian Albert <[email protected]>
Closes #231