pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to system-security

Microarchitecture Exploitation

system-security
0/15 challenges completed

Modern CPUs are impressive feats of engineering effort. Consistently offering performance improvements every generation, but how? This module explores security vulnerabilities that can lurk hidden, below the assembly, in CPU architecture itself!

Note: Meltdown challenges must be performed inside the VM!

Microarchitecture Exploitation - Below Assembly
Video
Slides
Microarchitecture Exploitation - Flush and Reload
Video
Slides
Microarchitecture Exploitation - Meltdown
Video
Slides
Microarchitecture Exploitation - Spectre
Video
Slides

Challenges

1
Shared Memory 1
Optional
2
Shared Memory 2
Optional
3
Baby Spectre 1
4
Baby Spectre 2
5
Baby Spectre 3
6
Baby Spectre 4
7
Baby Spectre 5
8
Prefetch Peek
9
Spooky Spectre 1
10
Spooky Spectre 2
11
Yan85 Reloaded
12
Ghost in the YPU 1
13
Ghost in the YPU 2
14
Molten Access
15
Molten Walk