Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
wiki:aca2020:morpheus:q [2020/01/20 16:39] – created Andreas Moshovos | wiki:aca2020:morpheus:q [2020/01/20 16:52] (current) – [Due before the lecture on Thursday Jan 23.] Andreas Moshovos | ||
---|---|---|---|
Line 6: | Line 6: | ||
* Q1: What type of attacks does Morpheus targets protecting from? Provide an example pseudo-code that is different than that shown in the paper. | * Q1: What type of attacks does Morpheus targets protecting from? Provide an example pseudo-code that is different than that shown in the paper. | ||
- | * Q2: Let's assume that Chrun is not used. Explain how a program performs a memory reference be it for instruction fetches or data. | + | * Q2: Let's assume that Chrun is not used. Explain how a program performs a memory reference be it for instruction fetches or data. Assume the program wants to read a value from address A. What are the steps that need to be followed. What address(es) does the L1, the LLC, and the off-chip memory see? |
- | * Q3: Followiong | + | * Q3: Following |
- | * Q3: How Churn helps defenses? | + | * Q4: How Churn helps defenses? |
- | * Q4: Can the program keep running while Churn is transitioning to a new state? Explain how memory references proceed while the machine is transitioning. | + | * Q5: Can the program keep running while Churn is transitioning to a new state? Explain how memory references proceed while the machine is transitioning. |