This page contains all the resources required for the Side-Channel Lab.
The VMs are the same as for the Runtime Security Lab.
There are multiple things you can try
taskset 0x2 ./binaryTry different cores.
cpupower -c all set -b 0Alternatively, try
cpupower frequency-set -g performance
In addition to the above things, try to cause a lot of interrupts. You can generate interrupts by running
stress -i 1 -d 1Play around with the numbers.
For Meltdown, KPTI and KASLR has to be disabled. Ensure that you pass
nopti nokaslrto your boot commandline (e.g., in the GRUB menu, or by editing "/etc/default/grub":
GRUB_CMDLINE_LINUX_DEFAULT="nosplash nopti nokaslr"
This happens in some VMs. It is best to run the attacks on a native Linux machine.
Security Week Graz 2019