====== Questionnaire about Morpeus ====== ==== Due before the lecture on Thursday Jan 23. ==== Please upload a PDF with your answers through Quercus. * Q1: What type of attacks does Morpheus targets protecting from? Provide an example pseudo-code that is different than that shown in the paper. * Q2: Let's assume that Chrun is not used. Explain how a program performs a memory reference be it for instruction fetches or data. Assume the program wants to read a value from address A. What are the steps that need to be followed. What address(es) does the L1, the LLC, and the off-chip memory see? * Q3: Following Q2 -- Again Churn is off. What an attacker has to do to circumvent Morpheus without Churn? State which mechanisms they have to circumvent and what information they will have to uncover to do so. * Q4: How Churn helps defenses? * Q5: Can the program keep running while Churn is transitioning to a new state? Explain how memory references proceed while the machine is transitioning.