(PDF) Spectre and Meltdown Attacks Detection using Machine
9 Pages2407 Words118 Views
Added on 2021-05-30
(PDF) Spectre and Meltdown Attacks Detection using Machine
Added on 2021-05-30
ShareRelated Documents
Meltdown and spectre exploitsThe article explains the hardware exploits that have been affecting CPUs that have been maderecently. The article gives a detailed explanation on the working of both exploits and is veryinsightful making it the most appropriate candidate to be summarized for this topic.According to the article, meltdown exploit has been there since 2011 and it manipulates theelements of out-of-order execution in order to change the state of cache of a CPU. That is thenused to dump the contents of memory that are cannot be accessed in a normal environment.On the other hand, spectre exploit makes use of the speculative execution capability inconjunction with branch prediction in order to read data that should not be accessible from aprocess’ memory. This involves training the branch predictor to always follow one specific paththen, after a number of repetitions, a branch mispredict is used to cause speculative exploitationof some code that is not supposed to be run.Most major operating systems have already released a patch for these exploits. However, theauthor concludes that the opportunity cost of processors with higher speed is the security.Therefore, for it to be more secure, we might have to give up on the speed and revert back slowersystems (Walton, J. & Nguyen, T., 2018).GUI operating system before 1985The article explains much about the graphical user interface (GUI), its evolution and history. Italso includes some of the mythology and misconceptions that are related to the history andevolution of GUIs.From the article we get to know that most people first interacted with a GUI on an Applecomputer. However, the first practical GUI that was usable was released in 1974 in the XeroxAlto computer. The computer was smaller than mainframes hence considered as a much portablereplacement for mainframe computers. However, generally it was still too big therefore was notvery useful for average users. Its features included bitmapping display. This was very necessary for displaying graphics. Otherthan that, it was also essential for WYSIWYG printing.
This became the basis for the development of the current GUIs for the various operating systems.Xerox developed better GUI systems from Alto’s designs and concepts. Apple later got the ideafrom Xerox and windows from Apple (Tuck, M., 2001).Low Powered Wide Area Network (LPWAN)In this resource the author elaborates how essential LPWAN is for internet-of-Things (IoT). Theresource is relevant since it shows the necessity in the emerging technology that is IoT.Currently available wireless networks are all for selling a high amount of data to their customerswhose devices have a very short lifespan in terms of battery. However, with the adoption of IoT,more devices will be using the network some of which will require more bandwidth when theycannot really have data sold expensively. This brings in the need for LPWAN for IoT which willenable use of low powered data making the whole setup less expensive as compared to what thecurrent wireless networks use (Teoco, 2017).Session Initiation Protocol (SIP)The resource describes and explains SIP as a Voice over IP (VoIP) protocol. The resource givesa good description of SIP, what it does, how it works and what it uses hence it gives a goodpicture of SIP and can therefore be used to learn SIP for someone who previously had no idea.SIP is a signaling protocol which is generally used for creating, modifying and terminating amultimedia session over the internet protocol (IP). In simple terms, a session refers to a callbetween two endpoints.SIP is an application layer protocol. It is defined by the Internet Engineering Task Force (IETF).The protocol applies the client server architecture and uses URL and URI from HTTP. It alsouses a text encoding scheme and a header style from SMTP. SIP is assisted by the sessiondescription protocol and the real time transport protocol. The former protocol describes a sessionwhile the latter is responsible for delivering video and voice over an IP network (Tutorials point,2018).
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Working of Meltdown and Spectre Exploitslg...
|9
|4028
|491
COIT 20246 Assignment Submissionlg...
|9
|3329
|56
Technology is killing jobs, and only technology can save themlg...
|15
|4067
|112
Technical Details Assignmentlg...
|14
|3393
|68
Desklib Online Library for Study Material with Solved Assignmentslg...
|8
|3538
|497
Sample Assignment on Electronic PDFlg...
|9
|3696
|108