This repository contains the reports of Seed Lab 2.0 projects which includes Breaking a Simple Cipher, TCP Attacks, Buffer Overflow Attack (Server), Request Forgery (CSRF) Attack, SQL Injection Attack, Meltdown Attack
-
Updated
Jan 4, 2023 - PHP
This repository contains the reports of Seed Lab 2.0 projects which includes Breaking a Simple Cipher, TCP Attacks, Buffer Overflow Attack (Server), Request Forgery (CSRF) Attack, SQL Injection Attack, Meltdown Attack
Meltdown exploits critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data that is currently processed on the computer. Meltdown work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.
[CS305 / CS341 - IIT Bombay] All my submissions in the coursework (★)
Meltdown ‘worst ever’ CPU bugs affect most computers , Old but Gold
Survey paper exploring Meltdown and Spectre vulnerabilities, accompanied by practical proof-of-concept (PoC) implementations for deeper understanding.
A distillation of the Spectre and Meltdown vulnerabilities.
A bibliography of hardware vulnerabilities.
Bachelor's thesis for BSc Computer Engineering at University of Pisa, about an implementation of "KAISER" mitigation against Meltdown in a didactic kernel
Add a description, image, and links to the meltdown-attack topic page so that developers can more easily learn about it.
To associate your repository with the meltdown-attack topic, visit your repo's landing page and select "manage topics."