Which of the following vulnerabilities allows attackers to trick a processor to exploit speculative execution to read restricted data?
a) Meltdown
b) Dylib Hijacking
c) Spectre
d) DLL Hijacking