For each paper, your assignment is two-fold. Before lecture:
lecn.txt
, and
sqn.txt
. You cannot use the question below. To the
extent possible, during lecture we will try to answer these questions. If
you submit your question before midnight the day before lecture, then there
is a chance we will answer by email. Below, we have included the questions
we've received from students in past years (when available), along with
answers to those questions, in case you find it helpful.
Once you submit your own question and answer (or after the deadline has passed), you can view the questions and answers that other students submitted.
Lecture 20
Consider the implementation of a Spectre attack from Appendix A of the original Spectre paper. On the first call of readMemoryByte() from main(), if the attack registers a cache hit for mix_i on line 76, what is the likely value of mix_i?