Side-channel attacks

Meltdown (security vulnerability)

Meltdown is one of the two original transient execution CPU vulnerabilities (the other being Spectre). Meltdown affects Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors. It allows a rogue process to read all memory, even when it is not authorized to do so. Meltdown affects a wide range of systems. At the time of disclosure (2018), this included all devices running any but the most recent and patched versions of iOS, Linux, macOS, or Windows. Accordingly, many servers and cloud services were impacted, as well as a potential majority of smart devices and embedded devices using ARM-based processors (mobile devices, smart TVs, printers and others), including a wide range of networking equipment.A purely software workaround to Meltdown has been assessed as slowing computers between 5 and 30 percent in certain specialized workloads, although companies responsible for software correction of the exploit reported minimal impact from general benchmark testing. Meltdown was issued a Common Vulnerabilities and Exposures ID of CVE-2017-5754, also known as Rogue Data Cache Load (RDCL), in January 2018. It was disclosed in conjunction with another exploit, Spectre, with which it shares some characteristics. The Meltdown and Spectre vulnerabilities are considered "catastrophic" by security analysts. The vulnerabilities are so severe that security researchers initially believed the reports to be false. Several procedures to help protect home computers and related devices from the Meltdown and Spectre security vulnerabilities have been published. Meltdown patches may produce performance loss. Spectre patches have been reported to significantly reduce performance, especially on older computers; on the newer eighth-generation Core platforms, benchmark performance drops of 2–14 percent have been measured. On 18 January 2018, unwanted reboots, even for newer Intel chips, due to Meltdown and Spectre patches, were reported. Nonetheless, according to Dell: "No 'real-world' exploits of these vulnerabilities [i.e., Meltdown and Spectre] have been reported to date [26 January 2018], though researchers have produced proof-of-concepts." Further, recommended preventions include: "promptly adopting software updates, avoiding unrecognized hyperlinks and websites, not downloading files or applications from unknown sources ... following secure password protocols ... [using] security software to help protect against malware (advanced threat prevention software or anti-virus)." On 15 March 2018, Intel reported that it will redesign its CPUs to help protect against the Meltdown and related Spectre vulnerabilities (especially, Meltdown and Spectre-V2, but not Spectre-V1), and expects to release the newly redesigned processors later in 2018. On 8 October 2018, Intel is reported to have added hardware and firmware mitigations regarding Spectre and Meltdown vulnerabilities to its latest processors. (Wikipedia).

Meltdown (security vulnerability)
Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Cybersecurity: Crash Course Computer Science #31

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to ke

From playlist Computer Science

Video thumbnail

Security Vulnerability Mitigations

Security vulnerabilities allow software to be manipulated in such a way that it misbehaves to the benefit of an attacker - security vulnerability mitigations work to thwart attempts to successfully exploit such a vulnerability. This landscape is continually changing in both the types of at

From playlist Security

Video thumbnail

How Meltdown and Spectre Make Your Computer Vulnerable

Another year, another security breach that could expose all of your information. Installing updates might be a good New Year's resolution. Check out the Crash Course Computer Science series at youtube.com/crashcourse We're conducting a survey of our viewers! If you have time, please give

From playlist Uploads

Video thumbnail

Kernel Recipes 2019 - Kernel hacking behind closed doors

The recent hardware security vulnerabilites exposed the kernel community to unprecedented restrictions and bureaucrazy. Pure software bugs which only affect the Linux kernel are a completely different category and the kernel community has established and well working ways to handle them.

From playlist Kernel Recipes 2019

Video thumbnail

Meltdown and Spectre - Professor Mark Handley, UCL

The Meltdown and Spectre vulnerabilities in almost all modern CPUs have received a great deal of publicity in the last week. Operating systems and hypervisors need significant changes to how memory management is performed, CPU firmware needs updating, compilers are being modified to avoid

From playlist Data science classes

Video thumbnail

Hacking Livestream #43: Meltdown and Spectre

A much requested live about recent CPU vulnerabilities. A lot of links below. https://googleprojectzero.blogspot.ch/ https://www.youtube.com/watch?v=6O8LTwVfTVs http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table http://www.openwall.com/lists/os

From playlist Gynvael's [EN] Live

Video thumbnail

PHP Security Pt 3

In this PHP Security video tutorial I go over the most vulnerable ways hackers attack websites. Website Authentication Cracking and Client Side Manipulation with Intercepting Proxy.

From playlist PHP Security

Video thumbnail

How To Use Nessus Professional For Ethical Hacking | Session 02 | #cybersecurity

Don’t forget to subscribe! In this project you will learn about how to use Nessus professional for ethical hacking, Nessus is a vulnerability scanner developed by Tenable. Learn how to identify vulnerabilities using Nessus and learn about the working of the tool. Nessus pro vulnerabilit

From playlist Use Nessus Professional For Ethical Hacking

Video thumbnail

Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks

EE380: Computer Systems Colloquium Seminar Exploiting modern microarchitectures: Meltdown, Spectre, and other hardware attacks Speaker: Jon Masters, Redhat Recently disclosed vulnerabilities against modern high performance computer microarchitectures known as 'Meltdown' and 'Spectre' are

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

This Is How Hackers Crack Your Password | Password Cracking and Brute Force Tools | Simplilearn

In this video on how hackers crack your password, we are going to cover the basics of password cracking and brute force tools. Multiple techniques of cracking passwords are also covered, along with the variety of tools being used by malicious hackers worldwide to steal user credentials. La

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

DevOpsDays Baltimore 2018 - Black Mirror Season 5: DevOps by Brendan O'Leary

Black Mirror Season 5: DevOps by Brendan O'Leary Black Mirror presents a haunting view of how modern technology places society a “minute away” from a dystopian future. DevOps and those of us that practice it find ourselves in a similar situation - partially mature technologies whose impli

From playlist DevOpsDays Baltimore 2018

Video thumbnail

Firmware Security: Why It Matters and How You Can Have It

A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway

From playlist Security

Video thumbnail

Kernel Recipes 2018 - Mitigating Spectre and Meltdown vulnerabilities - David Woodhouse

The Spectre and Meltdown vulnerabilities are part of a class of hardware flaws which have existed for years, but which have only recently been discovered. David will describe the problems, and explain the techniques used for mitigating them in software — from improvements in the CPU thro

From playlist Kernel Recipes 2018

Video thumbnail

Kernel Recipes 2019 - CVEs are dead, long live the CVE!

For the Linux kernel, CVEs do not work at all given the rate of fixes being applied and rapidly backported and pushed to users through a huge variety of different ways. The average “request to fix” date for Linux CVEs is -100 days, showing that either no one cares about CVEs for Linux, or

From playlist Kernel Recipes 2019

Video thumbnail

Stanford Seminar - The Soul of a New Machine: Rethinking the Computer

Bryan Cantrill Oxide Computer Company February 26, 2020 While our software systems have become increasingly elastic, the physical substrate available to run that software (that is, the computer!) has remained stuck in a bygone era of PC architecture. Hyperscale infrastructure providers ha

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

Transport Layer Security: Part 1

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Kali Linux 2018.1 - Kernel Updates & Patches

Hey guys! HackerSploit here! Kali Linux has been updated to the 2018.1 release, what's new? Just a major kernel update! Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a pack

From playlist Kali Linux

Related pages

POWER9 | Scheduling (computing) | Execution unit | POWER8 | Spectre (security vulnerability) | Timing attack | Haswell (microarchitecture) | Race condition | RSA (cryptosystem) | Coffee Lake