Fig. 1. CVE-2017-5754 Detail
Fig. 2. Intel, AMD CPU Interrupt rollback point
Fig. 3. Meltdown Attack Flowchart
Fig. 4. Meltdown attack Assembly language(x86)
Fig. 5. cache Locality of reference
Fig. 6. Physical Memory and Virtual Memory
Fig. 7. x86_64 linux kernel map
Fig. 8. page fault handler
Fig. 9. Page Fault Handler
Fig. 10. open_process.py
Fig. 11. Meltdown Attack Detection Result
Fig. 12. filter_addr.py
Fig. 13. Meltdown attack detection with decision tree
Table 1. Threshold value variation with load
Table 2. Signature vs Heuristic vs Decision Tree
References
- M. Lipp. et al. (2018). "Meltdown: Reading Kernel Memory from User Space. https://meltdownattack.com/meltdown.pdf.
- CVE-2017-5754 Detail, NIST (2017). https://nvd.nist.gov/vuln/detail/CVE-2017-5754.
- paboldin. (2018). meltdown-exploit. github. https://github.com/paboldin/meltdown-exploit.
- Timing attack, WIKIPEDIA. (2018). https://en.wikipedia.org/wiki/Timing_attack.
- S. J. Paek & J. M. Choi. (2015). Linux Kernel Internal, ArtStudio Book.
- Recommendation for countermeasures against OpenSSL vulnerability (HeartBleed). KrCert, https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=20884.
- Decision tree learning, WIKIPEDIA. (2018).https://en.wikipedia.org/wiki/Decision_tree_learning.
- I. Erez, M. Daniel, A. Yoav, G. Aviv & O. Ben. (2018). Detection of the Meltdown and Spectre Vulnerability. Check Point Research. https://research.checkpoint.com/detection-meltdown-spectre-vulnerabilities-using-checkpoint-cpu-level-technology/
- Code Pierce. (2018). Detecting Spectre and Meltdown Using Hardware Performance Counters. ENDGAME Online Website (Our Blog). https://www.endgame.com/blog/technical-blog/detecting-spectre-and-meltdown-using-hardware-performance-counters
- S. Hong & Y. J. Seo. (2016). Countermeasure of Sniffing Attack: Survey. Journal of Convergence Society for SMB, 6(2), 31-36. DOI : 10.22156/CS4SMB.2016.6.2.031
- H. J. Mun, S. H. Choi & Y. C. Hwang. (2016). Effective Countermeasure to APT Attacks using Big Data. Journal of Convergence Society for SMB, 6(1), 17-23. DOI : 10.22156/CS4SMB.2016.6.1.017
- M. S. Gu1 & Y. Z. Li. (2015). A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code. Journal of Convergence Society for SMB, 5(4), 37-42.