In this blog post, we will get into the details of the implementation of Spectre, the exploit that targets the vulnerbilities found in CPUs built by AMD, ARM, and Intel. We assume you are familiar with the concept of the attack, and you can inspect the Proof of Concept source code provided in the Appendix of the paper linked above. You might also find it easier to read this blog post with the source code side by side.
The following is an excerpt from an Intel Chip Chat interview with James Cabe, Global Alliances Manager at Fortinet. Chip Chat is a podcast series of informal interviews with some of the brightest minds in the industry, hosted by Intel employee Allyson Klein.