Skip to content
Informatikk notater
GitHubLinkedIn

Spectre & Meltdown

Kryptografi

TekstEncrypt/decryptHemmelig tekst
,K (key),

Spectre & Meltdown

Both of these security vulnerabilities abuse speculative execution to read memory that should be protected.

Spectre

Abuses speculative execution to read memory that should be protected. This is done by reading memory that is not allowed to be read, and then throwing away the result if it is not allowed. This allows access to memory from other processes.

Spectre uses a dedicated machine instruction such as clflush Flush+Reload

Meltdown

Abuses out-of-order execution to read memory that should be protected. This is done by reading memory that is not allowed to be read, and then throwing away the result if it is not allowed. This allows access to kernel memory from user space.

Out-of-order execution

Speculative execution

The CPU tries to guess what the next instruction will be, and executes it before it is needed. If it guessed wrong, it will just throw away the result.

Resources

Videos

Whitepapers