Problem
1) What are the similarities and differences between Meldown attack and Spectre attack?
2) To access the kernel data, what improvements can be applied to Meldown attack to win the race against data access checking?
3) Briefly describe the steps of Spectre attack to infer the secret data in the restricted area in the same process protected by an if condition.