In response to the widespread concern over the Spectre and Meltdown vulnerabilities, the text outlines an investigative approach using hardware performance counters to detect and mitigate these hardware attacks. These vulnerabilities exploit speculative execution and cache side-channels to disclose privileged memory, posing significant security challenges. The research focuses on using CPU performance counters, such as Transactional Synchronization Extensions (TSX) and Last-Level-Cache (LLC) UOPs counting, to identify abnormal patterns indicative of attacks, proposing strategies for detecting cache timing attacks and speculative branch execution leaks. The research highlights the potential of performance counters as cross-platform, low-overhead tools for monitoring and defending against these exploits. Despite the promising results, the text emphasizes that the research is ongoing, aiming to engage the broader research community in developing comprehensive defense mechanisms for this evolving class of vulnerabilities.