logo

(PDF) Spectre and Meltdown Attacks Detection using Machine

9 Pages2407 Words118 Views
   

Added on  2021-05-30

(PDF) Spectre and Meltdown Attacks Detection using Machine

   Added on 2021-05-30

ShareRelated Documents
(PDF) Spectre and Meltdown Attacks Detection using Machine_1
Meltdown and spectre exploitsThe article explains the hardware exploits that have been affecting CPUs that have been maderecently. The article gives a detailed explanation on the working of both exploits and is veryinsightful making it the most appropriate candidate to be summarized for this topic.According to the article, meltdown exploit has been there since 2011 and it manipulates theelements of out-of-order execution in order to change the state of cache of a CPU. That is thenused to dump the contents of memory that are cannot be accessed in a normal environment.On the other hand, spectre exploit makes use of the speculative execution capability inconjunction with branch prediction in order to read data that should not be accessible from aprocess’ memory. This involves training the branch predictor to always follow one specific paththen, after a number of repetitions, a branch mispredict is used to cause speculative exploitationof some code that is not supposed to be run.Most major operating systems have already released a patch for these exploits. However, theauthor concludes that the opportunity cost of processors with higher speed is the security.Therefore, for it to be more secure, we might have to give up on the speed and revert back slowersystems (Walton, J. & Nguyen, T., 2018).GUI operating system before 1985The article explains much about the graphical user interface (GUI), its evolution and history. Italso includes some of the mythology and misconceptions that are related to the history andevolution of GUIs.From the article we get to know that most people first interacted with a GUI on an Applecomputer. However, the first practical GUI that was usable was released in 1974 in the XeroxAlto computer. The computer was smaller than mainframes hence considered as a much portablereplacement for mainframe computers. However, generally it was still too big therefore was notvery useful for average users. Its features included bitmapping display. This was very necessary for displaying graphics. Otherthan that, it was also essential for WYSIWYG printing.
(PDF) Spectre and Meltdown Attacks Detection using Machine_2
This became the basis for the development of the current GUIs for the various operating systems.Xerox developed better GUI systems from Alto’s designs and concepts. Apple later got the ideafrom Xerox and windows from Apple (Tuck, M., 2001).Low Powered Wide Area Network (LPWAN)In this resource the author elaborates how essential LPWAN is for internet-of-Things (IoT). Theresource is relevant since it shows the necessity in the emerging technology that is IoT.Currently available wireless networks are all for selling a high amount of data to their customerswhose devices have a very short lifespan in terms of battery. However, with the adoption of IoT,more devices will be using the network some of which will require more bandwidth when theycannot really have data sold expensively. This brings in the need for LPWAN for IoT which willenable use of low powered data making the whole setup less expensive as compared to what thecurrent wireless networks use (Teoco, 2017).Session Initiation Protocol (SIP)The resource describes and explains SIP as a Voice over IP (VoIP) protocol. The resource givesa good description of SIP, what it does, how it works and what it uses hence it gives a goodpicture of SIP and can therefore be used to learn SIP for someone who previously had no idea.SIP is a signaling protocol which is generally used for creating, modifying and terminating amultimedia session over the internet protocol (IP). In simple terms, a session refers to a callbetween two endpoints.SIP is an application layer protocol. It is defined by the Internet Engineering Task Force (IETF).The protocol applies the client server architecture and uses URL and URI from HTTP. It alsouses a text encoding scheme and a header style from SMTP. SIP is assisted by the sessiondescription protocol and the real time transport protocol. The former protocol describes a sessionwhile the latter is responsible for delivering video and voice over an IP network (Tutorials point,2018).
(PDF) Spectre and Meltdown Attacks Detection using Machine_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Working of Meltdown and Spectre Exploits
|9
|4028
|491

COIT 20246 Assignment Submission
|9
|3329
|56

Technology is killing jobs, and only technology can save them
|15
|4067
|112

Technical Details Assignment
|14
|3393
|68

Desklib Online Library for Study Material with Solved Assignments
|8
|3538
|497

Sample Assignment on Electronic PDF
|9
|3696
|108