Spectre Attack Demo (i5-3320M and Intel Xeon v3)
This shows my own try of Proof of Concept Exploit demonstrating the Spectre attack. Unfortunately, I have been able to reproduce it smoothly both on my local laptop and on my AWS Server.
Exploiting Speculative Execution
According to the Spectre paper,
Spectre attacks trick the processor into speculatively executing instructions sequences that should not have executed during correct program execution
The two secrets are declared here:
char * secret = "This is some sample sensitive data";
char * secret2= "This is some other sample sensitive data";I first tried it on my local laptop running an Intel i5-3320M on Ubuntu 16.10 Yaketty
and it worked, as seen here:
Then, I tried it on my AWS EC2 Instance running an Intel Xeon E5-2676 v3 on Ubuntu Server 16.04TLS
and it worked as well:
Seems like we are all f*ucked.
Credits
Spectre was independently discovered and reported by Jann Horn and Paul Kocher in collaboration with, Daniel Genkin (University of Pennsylvania and University of Maryland), Mike Hamburg (Rambus), Moritz Lipp (Graz University of Technology), and Yuval Yarom (University of Adelaide and Data61).

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.




