Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.


Meltdown - Basics, Details, Consequences

Black Hat via YouTube


This course covers the learning outcomes and goals of understanding the Meltdown vulnerability, including its basics, details, and consequences. Students will learn about virtual memory, memory isolation, side-channel attacks, CPU cache, memory access latency, in-order and out-of-order execution, and practical attacks. The teaching method involves presenting theoretical concepts and practical demonstrations. The intended audience for this course includes cybersecurity professionals, software developers, and individuals interested in system security vulnerabilities.


Virtual Memory
Memory Isolation
Page Table Entry
Direct-physical map
Loading an address
Side-channel Attacks
CPU Cache
Memory Access Latency
Architecture and Microarchitecture
In-Order Execution
Out-of-Order Execution
Building the Code
Details: Exception Handling
Meltdown with Fault Suppression
Meltdown with Fault Prevention
Uncached memory
Uncachable memory
Practical attacks
Locating the victim process
Dumping memory content
Affected by Meltdown
Samsung Galaxy S7
Variant 3a
Is Meltdown (or Spectre) a side-channel attack?
Is Meltdown a variant of Spectre? Is it speculative execution?
Meltdown Mitigation
Kernel Page-table Isolation
KVA Shadow
Total Meltdown
A unique chance

Taught by

Black Hat


Start your review of Meltdown - Basics, Details, Consequences

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.