Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Pembuktian konsep simulasi serangan meltdown pada prosesor Intel Core i7 dengan sistem operasi Linux
Bookmark Share

Teks

Pembuktian konsep simulasi serangan meltdown pada prosesor Intel Core i7 dengan sistem operasi Linux

Eka Chattra - Personal Name; Obrina Candra Briliyant - Personal Name;

Indonesia
Perkembangan sistem komputer juga berdampak pada berkembangnya teknologi prosesor melalui penggunaan teknik optimasi pada proses out-of-order untuk meningkatkan kinerja sistem komputasi. Namun, penggunaan teknik optimasi tersebut memiliki kerentanan, terutama pada prosesor Intel. Kerentanan tersebut berupa eksploitasi data pada memori cache yang dapat dilakukan melalui serangan Meltdown. Meltdown adalah serangan eksploitasi yang memanfaatkan kerentanan pada CPU modern. Kerentanan tersebut dapat dimanfaatkan untuk mengambil data yang diproses pada suatu perangkat komputer, seperti kata sandi, pesan yang tersimpan pada browser, foto, ataupun dokumen penting. Berkaitan dengan dampak kerentanan tersebut, edukasi kepada masyarakat terutama sivitas akademi perlu dilakukan agar dapat mengetahui dan memahami serangan Meltdown sebagai langkah awal untuk mencegah dan menanggulangi terjadinya ancaman eksploitasi pada prosesor dari serangan Meltdown. Pada penelitian ini dilakukan modifikasi kode sumber yang digunakan pada serangan Meltdown sebagai pembuktian bahwa serangan Meltdown dapat mengeksploitasi data pada perangkat yang menggunakan prosesor Intel.

English

PROOF OF CONCEPT OF A MELTDOWN ATTACK SIMULATION ON INTEL CORE I7 PROCESSOR WITH LINUX BASED OPERATION SYSTEM

The development of computer systems has an impact on the development of processor technology through the use of optimization techniques in out-of-order processes to improve computing system performance. However, the use of these optimization techniques has vulnerabilities, especially on Intel processors. The vulnerability is in the form of data exploitation in the cache memory that can be done through a Meltdown attack. Meltdown is an exploit attack that takes advantage of vulnerabilities in modern CPUs. This vulnerability can be used to retrieve data that is processed on a computer device, such as passwords, messages stored in the browser, photos, or important documents. In connection with the impact of this vulnerability, education to the public, especially academicians, needs to be done in order to know and understand the Meltdown attack as a first step to prevent and overcome the threat of processor exploitation from the Meltdown attack. In this study, the source code used in the Meltdown attack was modified to proof that the Meltdown attack can exploit data on devices using Intel processors.


Availability

No copy data

Detail Information
Series Title
--
Call Number
2020 EKA p
Publisher
Bogor : Poltek SSN., 2020
Collation
xiv, 45 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
--
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
--
Specific Detail Info
-
Statement of Responsibility
Eka Chattra
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?