A crude implementation of an exploit for the meltdown attack.
Functional (at least on my laptop!)
Mostly based on the Meltdown paper and the paper describing the flush+reload cache timing attack.
A crude implementation of an exploit for the meltdown attack.
Functional (at least on my laptop!)
Mostly based on the Meltdown paper and the paper describing the flush+reload cache timing attack.