Covert channel communications using branch predictor

Assignment Help Computer Engineering
Reference no: EM131030589

This the a programming question.

Subject : Computer Artitecture

Covert Channel Communication Using Branch Predictors

In this exercise, you will implement and experiment with covert channel communications using branch predictors. In computer security, a covert channel is a type of security and surveillance evading technique that enables data transfer and digital communications between processes that are not allowed to communicate according to security or access control policy or between processes that are supposed to be isolated without explicit communication channels.

The article "Covert channels through branch predictors: a feasibility study" discloses a way of conducting covert channel communications using branch predictors. The article can be downloaded either from https://dl.acm.org/citation.cfm?id=2768571 or the class website. A presentation of the approach can be found here htto://caslab.eng.yale.edu/workshops/hasp20I5/slides_05_evtvushkin.pdf.

In this extra credit assignment, you will implement branch predictor based covert channels on a computer model of your choice (e.g., any Intel/AMD based computer). You will receive full credit if you can successfully demonstrate that two processes can communicate using the implemented covert channels. For testing purpose, one process should send a message "deadbeef' and the second process should correctly receive the message.

Different from the previous extra credit exercise, for this exercise, each point is added directly on your final grade. To receive full credit, you need to submit a simple writeup that briefly describes how your implementation works, demonstrate your implementation, and turn in a copy of your program (electronically, please).

Reference no: EM131030589

Questions Cloud

Did liberty life insurance violate any consumer laws : Provide potential arguments for both parties regarding the breach of the noncompete contract lawsuit. Support your arguments with cases or scholarly articles.
What is the amount of total assets after the loss : What is the amount of total assets after the loss? Hint: Think of the balance sheet before the loss and then determine what changes when the loss occurs, remembering that the left side must equal the right side.
Determine the work done by the air : Determine the work done by the air and the total heat transferred to the air during this process. Also show the process on a P-v diagram.
Advise frank if he qualifies as an employee : Advise Frank if he qualifies as an employee - As such, Juliet is damaging Globe's business. Globe wants to prevent Juliet carrying on her present activities - Advise Globe.
Covert channel communications using branch predictor : Implement branch predictor based covert channels on a computer model of your choice - implement and experiment with covert channel communications using branch predictor
Discuss the functions of the foreign exchange markets : Discuss the functions of the foreign exchange markets. Identify and appraise the primary institutions and organizations comprising the foreign exchange market.
What actions you intend to take on behalf of sell-o-rama : As the legal advisor, write a letter to Pinnacle Real Estate setting out Mr Torrible's concerns, and what action/s you intend to take on behalf of Sell-o-rama.
Compute the daily returns for both stocks : Compute the daily returns for both stocks. In addition, compute the returns of a Daily rebalanced Equal-weight portfolio and Value-weight portfolio. (Hint: the Datastream datatype for market value is "MV".)
Car rental agency assignment : PROJECT GUI MINIMUM REQUIREMENTS - Combo boxes, Option Buttons, and Checkboxes must interact with at least one Text Field or other control and a minimum of two fields must not be editable and their contents must be generated from other component inte..

Reviews

Write a Review

Computer Engineering Questions & Answers

  1 explain a minimum of three 3 heuristics to optimize

your supervisors and customers are very impressed with the database you have put together. however there is still that

  Discuss how the topology can be used

Discuss how the topology can be used

  Main differences between selection and switch structure

What do you need to analyze when directing flow of information in each case? Give code examples for if/else structure and switch structure that produce the same result.

  Discuss the process of producing the web site

A definition of the sort of users that would be expected to access the site. This should incorporate a description of any special provision needing to be made to make the site usable for disabled users (if that is appropriate).

  Exploring substantial component of information security

Explain the weaknesses in the controls? Specify whether there exist any new or upgraded access controls being considered? Let us explore this substantial component of the information security.

  How much time will it take with pipelining fully explain

alwaysclean is a laundromat that has three operations wash dry and iron. it takes 30 minutes to wash one load 40

  Define php and asp.net

What are some of the pros and cons of open source versus proprietary software.

  Developing the class square

Write down the class definition of the subclass of Square known as Fancy Square which has a method known as getDiagonal.

  How insightful is the experimental analysis with the planner

How insightful is the experimental analysis with the planner (how easily the planner solves the instances, how well the planner scales up as the instances are made larger or more complex, how well the results are reported: times, qualityof solutio..

  Create component classes as necessary to use together

Use either the array template created in an earlier lab to handle the array or you may use the vector class from the STL to handle the array of student record objects.

  Implement a new instruction that has two register operands

The MIPS instruction sequence could be used to implement a new instruction that has two register operands.

  How overlooking project cost management detrimental

When planning a project, planning the cost, budget, and work is an important element to the project. Address the following as related to cost management. How can overlooking project cost management be detrimental to completing projects within bu..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd