Skip to main content

TUGrazX: Transient-Execution Attacks: Understanding Meltdown and Spectre

Beyond software-based side-channel attacks there is a new class of attacks called transient-execution attacks. These attacks go beyond leaking meta-data and directly retrieve secret data but they use side channels as an data exfiltration mechanism to transmit the secret data to an attacker-controlled application. We will look at the most prominent of these attacks: Meltdown, Spectre, Foreshadow, and ZombieLoad. You will implement some of these attacks yourself and learn how to mitigate them.

Transient-Execution Attacks: Understanding Meltdown and Spectre
10 weeks
3–4 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

After a course session ends, it will be archivedOpens in a new tab.
Starts Apr 25
Ends Jun 6

About this course

Skip About this course

In this course, we build upon the knowledge we built up so far on cache side-channel attacks as well as the side-channel and security mindset. We will then go beyond software-based side-channel attacks and study transient-execution attacks. Transient execution is a mechanism present in modern processors, where the processor performs operations, often speculatively, that it later on has to undo. However, the side effects of these operations remain and leak data (not meta-data!) to the attacker. Similar to the prior courses, we provide you with the experience of discovering these attacks yourself in a group of students, living in a shared appartment. We again dive deeper into the microarchitecture and will now understand out-of-order pipelines and how their behavior introduces leakage. We will then use side channels to exfiltrate data and transmit it to an attacker-controlled application. We will learn about the most prominent of these attacks: Meltdown, Spectre, Foreshadow, and ZombieLoad. You will implement some of these attacks yourself, which requires skills in reading and writing C code. You will learn which attacks are relevant in the concrete native and virtualized environments you are working with, contributing to your risk assessment skills. In a set of small exercises, you will implement some of these attacks and show that you understood out-of-order execution pipelines, transient-execution attacks and potential mitigations against them.

At a glance

  • Institution: TUGrazX
  • Subject: Computer Science
  • Level: Advanced
  • Prerequisites:

    Knowledge and skills from the prerequisite course Side Channel Security S3: Cache Side-Channel Attacks and Mitigations. Knowledge and skills from Side Channel Security S4: Physical and Advanced Side-Channel Attacks are strongly recommended.

    We expect C and C++ programming skills on a similar level as in the prerequisite course. You may have obtained these as part of a university program such as computer science or a high school degree with a focus on computer science.

What you'll learn

Skip What you'll learn

- Understand the difference between side-channel attacks and transient-execution attacks
- Build up the ability to recognize which software may be exposed to transient-execution vulnerabilities
- Understand the immense security risks posed by transient-execution attacks and how these attacks can be mitigated

- Episode 1: Haunted by Spectre

Speculative behaviors can leak secrets from other programs.

- Episode 2: Daniel has a Meltdown

Computers sometimes leak secrets before realizing they shouldn't.

- Episode 3: Trust Issues

We investigate trusted execution environments for isolation.

- Episode 4: Foreshadow

We investigate transient-execution attacks on trusted execution environments.

- Episode 5: Noise is just someone else's data

Remaining noise turns out to still be data leakage.

Who can take this course?

Unfortunately, learners residing in one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. edX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

This course is part of Side Channel Security – Transient Execution and Fault Attacks Professional Certificate Program

Learn more 
Expert instruction
2 skill-building courses
Self-paced
Progress at your own speed
5 months
3 - 4 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.