Whitepaper of meltdown attack. By Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas,
Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
The security of computer systems fundamentally relies
on memory isolation, e.g., kernel address ranges are
marked as non-accessible and are protected from user
access. In this paper, we present Meltdown. Meltdown
exploits side effects of out-of-order execution on modern
processors to read arbitrary kernel-memory locations
including personal data and passwords.