Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
wiki:aca2020:morpheus:q [2020/01/20 16:52] – [Due before the lecture on Thursday Jan 23.] Andreas Moshovos | wiki:aca2020:morpheus:q [2020/01/20 16:52] (current) – [Due before the lecture on Thursday Jan 23.] Andreas Moshovos | ||
---|---|---|---|
Line 7: | Line 7: | ||
* Q1: What type of attacks does Morpheus targets protecting from? Provide an example pseudo-code that is different than that shown in the paper. | * Q1: What type of attacks does Morpheus targets protecting from? Provide an example pseudo-code that is different than that shown in the paper. | ||
* Q2: Let's assume that Chrun is not used. Explain how a program performs a memory reference be it for instruction fetches or data. Assume the program wants to read a value from address A. What are the steps that need to be followed. What address(es) does the L1, the LLC, and the off-chip memory see? | * Q2: Let's assume that Chrun is not used. Explain how a program performs a memory reference be it for instruction fetches or data. Assume the program wants to read a value from address A. What are the steps that need to be followed. What address(es) does the L1, the LLC, and the off-chip memory see? | ||
- | * Q3: Followiong | + | * Q3: Following |
* Q4: How Churn helps defenses? | * Q4: How Churn helps defenses? | ||
* Q5: Can the program keep running while Churn is transitioning to a new state? Explain how memory references proceed while the machine is transitioning. | * Q5: Can the program keep running while Churn is transitioning to a new state? Explain how memory references proceed while the machine is transitioning. | ||