This is a hands-on training session by Daniel Weber and Michael Schwarz given for the International Winter School on Microarchitectural Security 2022 (Mic-Sec '22).
In this repository you can find the three exercises (together with their solutions) and the presentation slides.
We require an x86 CPU. The exercises were tested on a modern Intel CPU. While they should also work for most non-Intel CPUs, we did not explicitly tested this.
We assume a native Linux installation. While the exercises may still work when executed in a VMs or the Windows Subsystem for Linux (WSL) the results are likely instable.
Microarchitecutral experiments are by their nature prone to noise on the system. Hence, the following steps can be taken to ensure that the exercises work more stable:
- If you are working on an Laptop, connect it to power.
- Stop all unneccessary programs running on the system. Especially music or video streaming.
If you have questions or find bugs in our exercises, feel free to reach out to us on Twitter or email:
- Daniel Weber
- Twitter: @weber_daniel
- Email: daniel.weber (AT) cispa.de
- Michael Schwarz
- Twitter: @misc0110
- Email: michael.schwarz (AT) cispa.de