Тёмный

Spectre and Meltdown attacks explained understandably 

Ymir Vigfusson
Подписаться 4,7 тыс.
Просмотров 56 тыс.
50% 1

Gentle overview of the core ideas exploited by the Spectre and Meltdown CPU attacks, including speculative execution, side-channel attacks, and cache memory. Presented by Prof. Ymir Vigfusson at Emory University (ymsir.com).

Опубликовано:

 

1 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 83   
@wilfhoward2602
@wilfhoward2602 6 лет назад
Why do people have to play music over talking, a most annoying thing to do.
@YmirVigfussonPresents
@YmirVigfussonPresents 3 года назад
Will take into account for future videos!
6 лет назад
Nice but the music is too loud. Thanks anyway.
@dontanton7775
@dontanton7775 6 лет назад
This is the most relaxed and best explanation of the topic I have found on the whole internet. You do not only make good examples, but you also slowly approach the topic with analogies and good visual representation. It is nearly perfect, the only thing worth improving is your microphone. Kudos to this. You should be a teacher.
@WeightlessFlex
@WeightlessFlex Год назад
I think this is the best RU-vid video for this on the site.
@AzRon999
@AzRon999 6 лет назад
BY FAR, the best explanation of Spectre I've seen, and I've looked at a few. And very well produced too. Thank you. Please make more videos.
@mrsexycasanova89
@mrsexycasanova89 6 лет назад
Hands down, best explanation! :-)
@mariafailli5558
@mariafailli5558 Год назад
great video and clear explainatrion. But the person in charge of the music.....smh 😒😭😭
@haritadepalli959
@haritadepalli959 6 лет назад
The best explanation with good terminology. Presentation can benefit by removing the starting music.
@azr_sd
@azr_sd 5 лет назад
this is the best explanation video of these exploits I have ever seen.Thank you :) and can you make a video on zombieload side channel attack?
@Petelecaster
@Petelecaster 5 лет назад
Best Explanation agreed. Really demonstrates what the code function actually does on machine level.
@azr_sd
@azr_sd 5 лет назад
@@Petelecaster yeah bro..
@hemzatalha3008
@hemzatalha3008 6 месяцев назад
Bro ! We listen to you or to your music!!!
@siddharthtaragi8150
@siddharthtaragi8150 Год назад
One of the most visually delighing and comprehendible explanations. Please note 14:29 mins is the crux of the explanation where usgae of an instrument, side channnel timing attack , memory leakage and other concepts comverge
@yagzyalcntas553
@yagzyalcntas553 4 года назад
30 flat earthers disliked
@bovinebear2979
@bovinebear2979 Год назад
great explanation
@TheUnorthodoxGears
@TheUnorthodoxGears 6 лет назад
Nice but the music is tilting me! 😂
@SameeraSenarathna
@SameeraSenarathna 6 лет назад
Great explanation !!! Thank You.
@vishalgupta5288
@vishalgupta5288 Год назад
Hands down the best example of spectre and meltdown. Subscribed immediately :)
@kohdynicholson4528
@kohdynicholson4528 5 лет назад
21 flat earthers watched this video
@achyuthvishwamithra
@achyuthvishwamithra 19 дней назад
In your example, how can a process controlled by the attacker access the memory allocated to a victim? Each process gets its own virtual address space. However, it does make sense that an attacker process could access kernel memory through speculative execution, bypassing privilege checks, thus melting the boundary between kernel and user process memory, hence the name "meltdown". The example you gave is more representative of the Meltdown vulnerability than Spectre, and a good mitigation for the Meltdown vulnerability would be kernel page table isolation. Spectre is based on the attacker training the CPU's branch predictor to expect certain branches and the cache implementation.
@floriansteiner5666
@floriansteiner5666 6 лет назад
it is really hard to understand you. The soundquality is to poor to volume up your 8bit music in the way you do, sorry.
@floriansteiner5666
@floriansteiner5666 6 лет назад
OH I'm sorry again ;) I should have stayed patient during the introduction...
@haritadepalli959
@haritadepalli959 6 лет назад
Can you please remove the background music, if you want the audience to have a better experience of your lecture?
@anandabiswas2701
@anandabiswas2701 6 лет назад
Great explanation, music was annoying though.
@0xc0ffee_
@0xc0ffee_ 4 года назад
I still don't understand the difference between meltdown and spectre...
@Anonymous-ed4id
@Anonymous-ed4id 8 месяцев назад
Eventually... I understood it the 5th time watching it😂
@YEC999
@YEC999 5 лет назад
The only thing that surprises me ist that the engineers at Intel thought for 25 years that this was secure. Really, really Idiotic.
@andrewo458
@andrewo458 6 лет назад
Probably the best video I’ve come across that explains how this functions for a non CS individual... thanks!
@PriyankaMondal-tg3fx
@PriyankaMondal-tg3fx Год назад
it rolled back all the registers but did not roll back the cache accesses
@ru1122
@ru1122 3 года назад
Watch 1.25 speed then this looks in8 😎
@indo3052
@indo3052 6 лет назад
This is high tech Israel having control of CPU’s
@MichaelScarn333
@MichaelScarn333 3 года назад
Great video thank you!
@yossibtk
@yossibtk 6 лет назад
Great video , I really like how you abstract things and make it simple to understand. I came to this video to understand what a meltdown attack is and you really nailed it. Bravo! [Constructive] Regarding the audio, many times It was a bit hard for me to understand your words, that made me repetitively go back and listen over and over again. I think It's a combination of your non-native accent and the low quality of the sound. I think that either using a higher bit rate for the sound or attaching subtitles (or both) would make it less struggling for me. Could be my ears only , though :)
@YmirVigfussonPresents
@YmirVigfussonPresents 6 лет назад
Thanks for the feedback! Good point, I've added subtitles now for easier reference. Enjoy!
@cycv5881
@cycv5881 Месяц назад
Great explanation :)
@dimethanol1181
@dimethanol1181 6 лет назад
These are security issues and have Not yet been seen and publicly documented outside a lab. Though i still want the cpus designed to prevent this from happening
@Darlyngtoo
@Darlyngtoo 6 лет назад
Can anyone explain how accessing Instrument[A[x]] results in the number 4 being "played"? I didn't really understand the syntax of "access Instrument[A[x]]". Thank you so much!
@damejelyas
@damejelyas 2 года назад
You should be a teacher 😶
@vultoneo
@vultoneo 6 лет назад
Nice, first source I found which explained how the data was retrievable from cashe :). I learned something today.
@ShopperPlug
@ShopperPlug 3 года назад
cache memory explanation is horrendously terrible... you should always show the cpu when talking about cache memory. the only reason why its called cache memory is because of latency, the cache memory block is literally inside the cpu and close by to the ALU, this makes it ridiculously fast for the cpu to load cache memory compared to ram memory. after ur cache explanation i had to force myself to watch another person describing about the spectre attack... and no it's not slow like a turtle, this is gunna make people dumb and think computers are slow. its just "slighty" slow compared to cache memory, not a full blown one second, minute or hour. We are talking about "slow" in the sub milli/micro/nano seconds, not a legit turtle speed..
@YmirVigfussonPresents
@YmirVigfussonPresents 3 года назад
Thanks for your comment -- I'll respond since I believe it is misleading. I am speaking of _relative_ speeds, which is an intuitive way of explaining time scales (or any scale) beyond what we experience normally as humans. Also, while the built-in cache memories are on the CPU, they are not inside the CPU _core_ that's doing the executions. And finally, at a relative level, an average instruction of a CPU core operating at only 1GHz is around 1ns, whereas accessing L3 on-chip is 20ns, or 20x slower. DRAM, at 80-100 ns is thus 80-100x slower than the execution of a single instruction (even those involving registers which are effectively the fastest form of memory in a modern computer). Thus I argue that the analogy is not actually misleading --- in fact, I wish more people deployed them to better understand the very basics of why poorly architected software perpetually winds up being slow!
@ShopperPlug
@ShopperPlug 3 года назад
@@YmirVigfussonPresents I clearly know the difference between the terms of cpu core and cpu. All of the most best explanations in books, articles and RU-vid related to cpu always shows the cache memory inside the cpu (not cpu core). This is the main reason why cpu core has fast access to cache memory as compared to external memory such ram. Many people does not know this and it brings confusion, stating that the cache memory is located inside the cpu (not cpu core) will make things much more sense.
@nickvanamburg
@nickvanamburg 3 года назад
What's the music at 0:40?
@thepromisedlan
@thepromisedlan 2 года назад
I've watched wayyy too many videos to understand this, this really helped!
@skyaldrin
@skyaldrin 6 лет назад
Fantastic video, thank you for the explanation :)
@joyhumin1
@joyhumin1 3 года назад
Recommended by our professor to understand what Spectre and Meltdown attack is. Well explained! Thank you! Subscribed for more content!
@fernandobernardo6324
@fernandobernardo6324 6 лет назад
I have paused, after a few seconds you were telling us about a series of attacks we have seen lately. What attacks? Do you know someone who has been attacked?
@nandadash
@nandadash 6 лет назад
Great explanation. Hackers understood the basics of computer architecture very well. I suspect the security patch to this will make system slow down.
@mrigankachakravarty4182
@mrigankachakravarty4182 4 года назад
gee oo dee... GOD
@thefelix7767
@thefelix7767 6 лет назад
This is a great explanation of how it works.
@anastasiadunbar5246
@anastasiadunbar5246 6 лет назад
What is the name of the first track used in this video?
@ozkaa
@ozkaa 4 года назад
that was really well explained, thankyou
@LocGaming731
@LocGaming731 6 лет назад
If this is u thank u
@yuryeuceda8590
@yuryeuceda8590 6 лет назад
Very well explained Professor. That was great. Both, explanation and attack technique
@amizan8653
@amizan8653 6 лет назад
Damn, that exploit is so clever!
@kristingudmundsdottir6221
@kristingudmundsdottir6221 6 лет назад
So cool the way you present it, even I got the most of it, but holy cow this is scary :)
@hayderh.952
@hayderh.952 4 года назад
The Best explanation! Thank you!
@MagDrag123
@MagDrag123 5 лет назад
Luck there are subtitles.
@SurenEnfiajyan
@SurenEnfiajyan 6 лет назад
Thanks, an excellent explanation.
@heroicH104
@heroicH104 4 года назад
Detailed and Clear, thanks for your explanation!
@Rakeshguptha28
@Rakeshguptha28 6 лет назад
This is good explanation.
@karanmanral1759
@karanmanral1759 6 лет назад
Great work.
@unbl3ss3d
@unbl3ss3d 6 лет назад
Excellent
@RollerDead
@RollerDead 6 лет назад
wow okay. very informative
@tigran5752
@tigran5752 5 лет назад
I understand this might be just an example, but being regular string password "hunter2" is stored in memory sequentially and when CPU loads first symbol, following (let's say 64) will appear in CPU cache as part of the same cache-line, so why should CPU spend more time on the next symbol reading?
@ymirvigfusson
@ymirvigfusson 5 лет назад
You are right on both accounts: it's just an example, and indeed memory accesses like that have an interplay with the cache hierarchy and register sizes. It's worth looking at academic papers or implementations of timing attacks, precisely to see how to control for these effects.
@tigran5752
@tigran5752 5 лет назад
@@ymirvigfusson thanks! anyway for simple explanation example is good! Just worth mentioning that things are not that simple :)
@findnabeel
@findnabeel 6 лет назад
Well explained. Thanks
@ramadasmahale9193
@ramadasmahale9193 6 лет назад
Can anyone tell me why A[x] doesn't throw an Out of Bounds exception? This attack kind of makes use of a buffer overread... And there are already defences in place for such attacks, right? Then how does A[x](a buffer overread go through)?
@SuperNikio2
@SuperNikio2 6 лет назад
I THINK it's because the CPU doesn't know it's out of bounds. It need the kernel to tell it that.
@OpenGL4ever
@OpenGL4ever 5 месяцев назад
The CPU does this speculative. The IF instruction is not yet completed at this point and the CPU is already starting to process the instructions contained in the IF loop speculative in order to be able to provide an answer more quickly if the IF query as to whether the earth is flat is correct. In the normal flow of the program, the question whether the earth is flat is of course answered with no. Which is why the IF loop would not be entered in normal program flow. But since it was already entered in advance and speculatively, an out of bounds error was never thrown here, because that was not the normal program flow, but only a speculative one that was not checked. And since this was done speculatively, the data is now in the cache. It's a quite clever attack.
@kalankasiyambalapitiya7615
@kalankasiyambalapitiya7615 6 лет назад
Good explanation !!!!
@刘新-s3n
@刘新-s3n 5 лет назад
great!
@narendrajayram1317
@narendrajayram1317 5 лет назад
great explanation...
@Ankhelinos
@Ankhelinos 6 лет назад
Glorious!
@pedrexsevenz1856
@pedrexsevenz1856 6 лет назад
the world really is flat or planeard
@administrator7400
@administrator7400 6 лет назад
Professor. I have been spending an entire week trying to rid myself of this very attack you are describing. It has infected everything survived hard drive wipes affected windows and Ubuntu. And I think I am in over my head. I would be willing to compensate you for your time should you be able to chat with me for a few minutes I am in need of someone who has experience with this. It's driving me insane.
@INSTAKILLA
@INSTAKILLA 6 лет назад
The music you put on this video makes me want to vomit and gave me a headache. I still left a like for the content of the video itself.
Далее
Rowhammer attacks explained simply
18:49
Просмотров 29 тыс.
Spectre & Meltdown - Computerphile
13:45
Просмотров 347 тыс.
Teeth gadget every dentist should have 😬
00:20
Просмотров 1 млн
Лиса🦊 УЖЕ НА ВСЕХ ПЛОЩАДКАХ!
00:24
When you Accidentally Compromise every CPU on Earth
15:59
Spectre Attacks Exploiting Speculative Execution
21:11
Meltdown & Spectre vulnerabilities - Simply Explained
6:40
Optimising Code - Computerphile
19:43
Просмотров 147 тыс.
Why are Spectre and Meltdown So Dangerous?
7:43
Просмотров 1,1 млн
Explaining the Spectre and Meltdown Vulnerabilities
13:08
Harder Drive: Hard drives we didn't want or need
36:47