logo

Working of Meltdown and Spectre Exploits

9 Pages4028 Words491 Views
   

Added on  2021-06-16

About This Document

Title and Reference: Working of Meltdown Exploit, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. Title and Reference: Working of Meltdown Exploit, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard,

Working of Meltdown and Spectre Exploits

   Added on 2021-06-16

ShareRelated Documents
Week 1The text discusses how modern CPUs function. Recently a critical flaw inmicroprocessor design has been discovered that allows two extremely serioussecurity exploits: Spectre and Meltdown. Find and summarise ONE resource thatdescribes how either of these exploits work. The resource (and your summary)should focus on what is occurring in the CPU that allows these exploits to occur.TitleandReference:Working of Meltdown ExploitLipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin,D., Yarom, Y. and Hamburg, M. (2018). Meltdown. [online] Meltdownattack.com. Available at:https://meltdownattack.com/meltdown.pdf [Accessed 10 May 2018].Summary:Research paper on the Meltdown Exploit has been chosen has the resource for theweek. It has been selected since a detailed description of the attack and theassociated mechanism is covered in the research paper. The computer architectureand the associated principles have been defined since a long time. The exploitattacks and attempts to bring changes in this architecture. The impact or theconsequences of the attack depend upon the data sets and values that are affectedby the attack. For instance, if the confidential data sets are modified then theresulting impact would be huge and vice versa. The security boundaries that areassociated with the computer architecture are targeted and melted down as a resultof the impact and that is the source of origin of the attack. The mechanism behindthe exploit is based upon varied instruction sets. For example, getByte andprobeArray instructions are used to extract the data values from the kernel memory.There is mix speculative execution process that is involved in this exploit throughwhich an element of probeArray is extracted and is stored in the cache memory. Theaccess time involved with the element provides the information on the extractionprocess. Such a process may also provide a value of the element in return whichleads to the compromise of the security. The data sets captured can therefore be ofsensitive nature while they may also be public or less sensitive as compared to therest of the data elements and values.Week 2Prior to 1985, there were very few Operating Systems (OSes) that used GraphicalUser Interfaces (GUIs). Find and summarise ONE resource that describes ONE ofthese GUI operating systems. The OS must have been release prior to 1985 socannot be Microsoft Windows. TitleandReference:Lisa OSMachistory (2018). Apple Lisa - Mac History. [online] Mac History. Available at:http://www.mac-history.net/apple-history-2/apple-lisa/2007-10-12/apple-lisa [Accessed 10May 2018].Summary:The website is used as a resource that provides the detail of one of the operatingsystems that were launched before 1985. Apple came up with Local IntegratedSoftware Architecture (LISA) with the release of LISA personal computer. Thecomputer had the LISA operating system that acted as an interface between thesystem and its users. The OS was released in the early 1980s and the primarymotive behind its release was to offer the users a document processing platform. Thelayout and the options presented on the operating system were evenly spread outand there was a menu that was kept on the top. The menu comprised of severaloptions similar to the present day operating systems and applications, such as File,1
Working of Meltdown and Spectre Exploits_1
Edit, Print, etc. The deleted files went to the wastebasket and it was present on thedesktop. The users were also provided with the calculator utility and there wereoptions as clipboard, profile, preferences, etc. The main focus was kept on the easeof usage and therefore, the operating system provided all of the options and iconsright on the desktop. The users could also save their respective files using the folderarchitecture which was followed for better organization of the files. The operatingsystem was also upgraded a couple of times; however, it failed to make its markamong the end-users and in the technical world. It was later discontinued after therelease of Windows OS in the market. Macintosh also came up after a few years. Week 3Low-Powered Wide-Area Networks (LPWANs) are wireless communication networksthat are characterised by linking devices over large distances. Devices (includingsimple sensors) typically can only communicate at very low bit rates, however, thecommunication and associated electronics consume very little power. As such,LPWAN devices can be battery powered and operate independently for manymonths or even years. Find and summarise ONE resource that describes ONEplatform or technology that implements a LPWAN. Title and Reference:Narrow-BandIoTGsma (2018). Narrowband – Internet of Things (NB-IoT) | Internet of Things. [online] Internetof Things. Available at: https://www.gsma.com/iot/narrow-band-internet-of-things-nb-iot/[Accessed 10 May 2018].Summary:Low Power Wide Area Networks, also known as LPWAN is the technology thatallows and support long range communication at lower bit rate. There are varioustechnologies that have been developed to support LPWAN and one of suchtechnologies is NarrowBand Internet of Things. It is also referred as NB-IoT and itensures that the power consumption of the devices in connected systems andapplications is brought down. With the lowering down of the power consumption, thesystem efficiency and its capacity is also improved. With the advent of technology,the technocrats have now come up with physical layer channels that allow andsupport extended coverage. In such cases, extremely low device complexity andrural connectivity is made possible. It is expected that the cost of the technology willbe currently equivalent to GSM/GPRS. However, it will further drop with the increasein demand. There are also a number of compatibility tests and analysis proceduresthat have been executed so that the compatibility of the technology may be verifiedand validated in advance. It has provided the results that NB-IoT is compatible withmost of the leading devices, sensors, operating systems, and platforms that arepopular in the market. For the security point of view, the technology makes sure thatthe information properties and the privacy of the data sets is always protected andkept secured. Another benefit that comes along with the technology is that it is fairlysimple and easy to understand and the complexity levels are low. Week 4Voice over IP (VoIP) is a group of hardware and software technologies that allowusers to communicate via voice and video over the Internet. VoIP uses a number ofdifferent software protocols, depending on the application. Find and summarise ONEresource that describes ONE of these VoIP protocols.2
Working of Meltdown and Spectre Exploits_2
Title and Reference:MediaGatewayControlProtocolCisco (2018). Understanding MGCP Interactions with Cisco CallManager. [online] Cisco.com.Available at: https://www.cisco.com/c/en/us/support/docs/voice/media-gateway-control-protocol-mgcp/44130-understanding-mgcp.pdf [Accessed 10 May 2018].Summary:The transmission of voice and multimedia content on the Internet Protocol (IP) ismade possible with the aid of Voice over Internet Protocol (VoIP). There are a lot ofprotocols that have been listed and are defined under VoIP and one of the significantand useful one out of the list is the Media Gateway Control Protocol (MGCP). Themultimedia transmissions and exchanges that are carried out require efficientsession management and its handling. Also, the quality of the transmissions can bemaintained when the signals are adequately managed and handled. All of thesetasks are given shape by MGCP. There are a lot of data packets that are transmittedon the networking and communication channels. MGCP handles these sets betweenthe media gateways and also performs the task of conversion of the data formats.There are changes that are taking place in the field of technology. These changesare reflected in the MGCP as well as there have been updates released in themarket in association with the same. The updated protocols are known by the namesof H.248 and Megaco. There are no issues with the standardization of the protocol asthe governing and regulatory bodies have signed off the protocol and all of itsassociated components. There is a master/slave model used in the application layerof the protocol. In this case, the master is termed as the media gateway controllerand the associated rights are also provided to the master. Time division multiplexingis also supported by the protocol. Week 5One of the many uses of cryptography has been the development of the blockchain.Blockchains are commonly used as the basis for maintaining the data integrity ofcrypto currencies, though have many, many more applications. Find and summariseONE resource that describes how blockchains work. Note that the resource shouldfocus on the blockchain mechanism, NOT crypto currencies.TitleandReference:Working of BlockchainCheng, S., Zeng, B. and Huang, Y. (2017). Research on application model of blockchaintechnology in distributed electricity market. IOP Conference Series: Earth and EnvironmentalScience, 93, p.012065.Summary:Blockchain is characterized as a type of disseminated record that monitors thecomputerized records based on prerequisites and proprietorship. It is circulatedrecord that does not have a brought together database like a large portion of theother conventional databases. It incorporates a substantial chain of databasereproductions which are synchronized utilizing Internet and can be seen by any ofthe element introduced in the system. The Blockchain systems can be private oropen in nature according to the prerequisites of the elements included. The workingof the Blockchain innovation can be clarified through any of the computerizedexchanges. At the point when any of the computerized exchanges are brought outthrough Blockchain, they are joined together in a piece that is cryptographicallysecured. The gathering is done based on the event of alternate exchanges and thesquare is shared on the whole system. The end of the exchange is completed by the3
Working of Meltdown and Spectre Exploits_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Desklib Online Library for Study Material with Solved Assignments
|8
|3538
|497

Desklib: SEO Title Suggestions
|9
|3724
|431

Sample Assignment on Electronic PDF
|9
|3696
|108

COIT 20246 Assignment Submission
|9
|3329
|56

Technology is killing jobs, and only technology can save them
|15
|4067
|112

(PDF) Spectre and Meltdown Attacks Detection using Machine
|9
|2407
|118