Time-travelling exploits with Meltdown

  • You‘re a software developer who writes the memory/trap code for virtual machine hypervisors. My condolences to you.
  • You’re a software developer who writes the memory manager for a major operating system (hi Landy!)
  • You’re a software developer who works on the JIT component of a web-browsers’ JavaScript execution engine.
Zoomed-in view of an out-of-order speculative-execution pipeline
The Oracle at Delphi is the earliest known prototype of a branch predictor

The Exploit for Meltdown

Mitigating the Meltdown

Microscope view of a processor unwinding speculatively executed instructions
Two Microsoft engineers test the updated system-call interface that warps the kernel in and out of view

--

--

--

Mostly #infosec or #natsec tweets. #FOIA|s and document tweetstorms via @foiathethings

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Technical workshop at AssoConnect

AGENT RANSACK 🔍

Communication the heart of AGILE

BlueKeep Exploit Analysis

Customer Development in DeFi

Struggling with Linksys Velop Yellow Light | Linksys Velop Yellow Light

My favorite interview question

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Pwn All The Things

Pwn All The Things

Mostly #infosec or #natsec tweets. #FOIA|s and document tweetstorms via @foiathethings

More from Medium

Solar-chan - IoT as an anime character

How I reversed engineered Twitter to capture user input and rate it’s activity.

Using store with Lit-elements

Summary of AI Code Completion Tools — Cosy