Covert channel communications using branch predictor

Assignment Help Computer Engineering
Reference no: EM131030589

This the a programming question.

Subject : Computer Artitecture

Covert Channel Communication Using Branch Predictors

In this exercise, you will implement and experiment with covert channel communications using branch predictors. In computer security, a covert channel is a type of security and surveillance evading technique that enables data transfer and digital communications between processes that are not allowed to communicate according to security or access control policy or between processes that are supposed to be isolated without explicit communication channels.

The article "Covert channels through branch predictors: a feasibility study" discloses a way of conducting covert channel communications using branch predictors. The article can be downloaded either from https://dl.acm.org/citation.cfm?id=2768571 or the class website. A presentation of the approach can be found here htto://caslab.eng.yale.edu/workshops/hasp20I5/slides_05_evtvushkin.pdf.

In this extra credit assignment, you will implement branch predictor based covert channels on a computer model of your choice (e.g., any Intel/AMD based computer). You will receive full credit if you can successfully demonstrate that two processes can communicate using the implemented covert channels. For testing purpose, one process should send a message "deadbeef' and the second process should correctly receive the message.

Different from the previous extra credit exercise, for this exercise, each point is added directly on your final grade. To receive full credit, you need to submit a simple writeup that briefly describes how your implementation works, demonstrate your implementation, and turn in a copy of your program (electronically, please).

Reference no: EM131030589

Questions Cloud

Did liberty life insurance violate any consumer laws : Provide potential arguments for both parties regarding the breach of the noncompete contract lawsuit. Support your arguments with cases or scholarly articles.
What is the amount of total assets after the loss : What is the amount of total assets after the loss? Hint: Think of the balance sheet before the loss and then determine what changes when the loss occurs, remembering that the left side must equal the right side.
Determine the work done by the air : Determine the work done by the air and the total heat transferred to the air during this process. Also show the process on a P-v diagram.
Advise frank if he qualifies as an employee : Advise Frank if he qualifies as an employee - As such, Juliet is damaging Globe's business. Globe wants to prevent Juliet carrying on her present activities - Advise Globe.
Covert channel communications using branch predictor : Implement branch predictor based covert channels on a computer model of your choice - implement and experiment with covert channel communications using branch predictor
Discuss the functions of the foreign exchange markets : Discuss the functions of the foreign exchange markets. Identify and appraise the primary institutions and organizations comprising the foreign exchange market.
What actions you intend to take on behalf of sell-o-rama : As the legal advisor, write a letter to Pinnacle Real Estate setting out Mr Torrible's concerns, and what action/s you intend to take on behalf of Sell-o-rama.
Compute the daily returns for both stocks : Compute the daily returns for both stocks. In addition, compute the returns of a Daily rebalanced Equal-weight portfolio and Value-weight portfolio. (Hint: the Datastream datatype for market value is "MV".)
Car rental agency assignment : PROJECT GUI MINIMUM REQUIREMENTS - Combo boxes, Option Buttons, and Checkboxes must interact with at least one Text Field or other control and a minimum of two fields must not be editable and their contents must be generated from other component inte..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Complete the micro-timing diagram

Complete the macro-timing diagram, Complete the micro-timing diagram

  Suppose it would take 100 hours in execution

For a certain program, 1% of the code accounts for 50% of the execution time. evaluate the following strategies with respect to programming time and execution time.

  Assume, a computer has 2^16 bytes of main memory

assume, a computer has 2^16 bytes of main memory. There is a direct-mapped cache of 1KB with a line size of 4 bytes. Determine which cache block will the memory reference 111Bh map to?

  Create a 3d graphics scene using opengl

Your task is to create a 3D graphics scene using OpenGL matching the theme described above. Your creation will include a path following a non-linear path on which the game or simulation will occur. There will be a series of camera views.

  Questioninformation representationa security camera in an

questioninformation representationa security camera in an office building has 1000 x 1000 pixels. each pixel shows a

  Despite increases in computing power

Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations. Discuss at least three reasons why text-oriented interfaces are still the most common.

  Features of a change management tool

Features of a Change Management Tool

  Find the minimum sum of product expression

Find the minimum sum of product expression for the subsequent expression:

  Inadynamicbusinessmodelwealsorepresentthelife-cyclerelations

inadynamicbusinessmodelwealsorepresentthelife-cyclerelationshipsamongtheseentitiesshowingwhichentityisresponsibleforwhic

  Create a implementation file containing the member function

Create a specification file containing the declaration of the VerifyDate class. Create a implementation file containing the member function definitions for VerifyDate.

  Define open-source and proprietary databases

describe open-source and proprietary databases. What are some advantages and disadvantages of each type of database? What characteristics a business should consider when choosing a database.

  Use the int cast process to convert to an integer

give Output the corresponding letter grade along with the initial number entered in decimal format utilizing the printf method and format specifiers. Output the number in only 3 decimal places.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd