Главная
Study mode:
on
1
Intro
2
Virtual Memory
3
Memory Isolation
4
Page Table Entry
5
Direct-physical map
6
Loading an address
7
Side-channel Attacks
8
CPU Cache
9
Memory Access Latency
10
Architecture and Microarchitecture
11
In-Order Execution
12
Out-of-Order Execution
13
Building the Code
14
Details: Exception Handling
15
Meltdown with Fault Suppression
16
Meltdown with Fault Prevention
17
Uncached memory
18
Uncachable memory
19
Practical attacks
20
Locating the victim process
21
Dumping memory content
22
Affected by Meltdown
23
Samsung Galaxy S7
24
Variant 3a
25
Is Meltdown (or Spectre) a side-channel attack?
26
Is Meltdown a variant of Spectre? Is it speculative execution?
27
Meltdown Mitigation
28
Kernel Page-table Isolation
29
Apple
30
KVA Shadow
31
Implementing
32
Total Meltdown
33
A unique chance
Description:
Explore the intricacies of the Meltdown vulnerability in this 47-minute Black Hat conference talk. Delve into the fundamentals of virtual memory, memory isolation, and CPU architecture. Understand how Meltdown breaks the critical barrier between user applications and operating systems, allowing unauthorized access to system memory. Learn about side-channel attacks, CPU caches, and memory access latency. Examine the details of exception handling and various Meltdown attack techniques. Discover practical attack scenarios, including locating victim processes and dumping memory content. Investigate the impact on different systems, including mobile devices. Clarify misconceptions about Meltdown's relationship to Spectre and speculative execution. Finally, explore mitigation strategies such as Kernel Page-table Isolation and KVA Shadow, and consider the broader implications of this vulnerability for system security.

Meltdown - Basics, Details, Consequences

Black Hat
Add to list
0:00 / 0:00