This repository contains the proof-of-concept implementation for the paper "Reviving Meltdown 3a" (ESORICS 2023).
The folder pocs
contains PoCs for the different system registers that showed leakage during our experiments.
The folder regcheck
contains the code of our analysis tool.
The tool checks whether a given system is vulnerable to Meltdown 3a and which system registers it leaks.
The folder kaslr-break
contains the code for the KASLR break using CounterLeak.
The folder spectre-counterleak
contains the code for the Spectre V1 attack using CounterLeak.
The folder zigzagger-bypass
contains the code for the Zigzagger case study.
If there are questions regarding this tool, please send an email to daniel.weber (AT) cispa
or message @weber_daniel
on Twitter.
You can find the paper here. You can cite our work with the following BibTeX entry:
@inproceedings{Weber2023Meltdown3a,
author={Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael},
booktitle = {ESORICS},
title={Reviving Meltdown 3a},
year = {2023}
}
We are providing this code as-is. You are responsible for protecting yourself, your property and data, and others from any risks caused by this code. This code may cause unexpected and undesirable behavior to occur on your machine.