logo

Computer Security - Assignment Sample

   

Added on  2021-04-19

14 Pages3627 Words29 Views
Running head: COMPUTER SECURITYCOMPUTER SECURITYName of the StudentName of the UniversityAuthor Note

COMPUTER SECURITY2Table of ContentsIntroduction................................................................................................................................3Explanation................................................................................................................................3Spectre....................................................................................................................................3Meltdown...............................................................................................................................4Countermeasures........................................................................................................................5Spectre....................................................................................................................................5Meltdown...............................................................................................................................7Future Impact.............................................................................................................................8Protection against Meltdown and Spectre..............................................................................9Conclusion................................................................................................................................10References................................................................................................................................12

COMPUTER SECURITY3IntroductionThe computer system should always kept secured in order to execute its properworking. When an attack is generated in a computer system, it can lead to serious problem.Spectre and meltdown exploit the vulnerability of modern processors. The focus of thevulnerability relating to the hardware is to allow programs to steal data, which are stored inthe computer system. The program, which is involved into the concept, does not permitreading of the data from another program, a malicious program directly can exploit thespecter and meltdown to get the information of the data, which is stored in the memory ofother programs that are running. The information can be a password, which is stored in thebrowser or password manager, emails, personal photos and even critical business-relateddocuments (Trippel, Lustig and Martonosi 2018). The working of the Spectre and meltdowncan be done on personal computers, cloud concept as well as mobile devices. Cloudprovider’s infrastructure is a factor, which makes it possible to get the data from thecustomers quite easily (Middleton 2017). The main aim of the report is to focus on the concept of specter and meltdown. Theconcerning factor is the working of the two aspects and bringing into account thecountermeasures relating to the aspect. The role, which the concept would be playing shortly,is one of the biggest concern sectors in this aspect. The considerations that should be taken inthe future so that the users can prevent themselves from attack is a primary focus of thereport. The future prediction relating to the impact of the Meltdown and Spectre are alsotaken into consideration.

COMPUTER SECURITY4ExplanationSpectreSpectre can be considered as an attack, which involves the victim to performoperations, which would not have taken place during the process of execution if it were acorrect program. This directly leaks the information of the user using side channel (Trippel,Lustig and Martonosi 2018). Taking into consideration physical devices, the computationsmajorly leave observable side effects. Spectre can be considered slightly different from theconcept of meltdown. It has the potentiality to allow hackers to trick otherwise freeapplication which is error-free into giving up information which is secret. It can be statedhere that the concept of the specter is very difficult to hack from the hackers but on the otherhand, it is more difficult to fix and it can be expected to be a problem, which would bebigger. The spectre can be used directly to trick normal application in the framework ofproviding data, which is sensitive. This potentially means anything, which is processed usingan application that can be stolen which may include data and password. The concept ofspeculative execution can be considered as a technique which is used by high end processorsto increase the speed and the performance using predicting the paths of execution in futureand executing the instructions prematurely which are in it (Trippel, Lustig and Martonosi2018). Two persons Paul Kocher and horn who worked collectively with Daniel Genkin whowas from the University of Pennsylvania discovered the Spectre individually. Also, theMaryland University. MeltdownMeltdown can be considered as a microarchitectural attack, which aims at exploitingthe out of order process of execution to leak the memory of the target user. Meltdown is

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Meltdown and Spectre Assignment PDF
|16
|4130
|63

The Meltdown and Spectre Assignment
|17
|4180
|48

Information and Communication Technology Assignment
|9
|4236
|92

Assignment on Computer security
|15
|3824
|29

Meltdown and Spectre - Assignment PDF
|17
|4531
|107

COIT 20246 : Information and Communication Technology
|9
|4199
|51