Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/76778
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2021-06-03T06:50:29Z-
dc.date.available2021-06-03T06:50:29Z-
dc.date.issued2020-
dc.identifier.citationAgius, K. (2020). Meltdown and Spectre vulnerabilities, and performance issues of related patches (Bachelor's dissertation).en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/76778-
dc.descriptionB.Sc. IT (Hons)(Melit.)en_GB
dc.description.abstractMeltdown and Spectre attacks are hardware vulnerabilities at a CPU’s microarchitectural level, in which the attacker can manipulate various performance enhancement techniques that operate, to extract sensitive data from within the cache memory. The vulnerabilities make directly use of speculative execution, branch prediction and out-of-order execution (Lipp et al, 2018) and (Kocher et al, 2019), in which the attacker injects malicious code in order to obtain data from within the CPU’s cache memory. Software patches with regards to various operating systems and system kernel have been developed and distributed in order to mitigate the attack’s severity. In this study, we used the benchmarking tool 7-Bench, which makes direct use of the operations that the patches target, mainly including branch prediction and out-oforder execution, which are the main microarchitecture functions that have been implemented in modern day CPUs and manipulated through Spectre and Meltdown. The benchmarking tool was implemented on a wide variety of modern generation processors and system frameworks in order to analyse the impact that such patches have caused across various platforms. The benchmarking tool was executed on the systems during various scenarios, these being: benchmarks with all the patches enabled and disabled, and for each patch individually. The results obtained from these benchmarks were then compared to the other results obtained from the system in order to analyse the performance differences that they have caused. Furthermore, these results were statistically analysed in order to test the hypothesis set for this study.en_GB
dc.language.isoenen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer architectureen_GB
dc.subjectComputer input-output equipmenten_GB
dc.subjectMicroprocessorsen_GB
dc.titleMeltdown and Spectre vulnerabilities, and performance issues of related patchesen_GB
dc.typebachelorThesisen_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.publisher.institutionUniversity of Maltaen_GB
dc.publisher.departmentFaculty of Information and Communication Technology. Department of Computer Information Systemsen_GB
dc.description.reviewedN/Aen_GB
dc.contributor.creatorAgius, Kevin (2020)-
Appears in Collections:Dissertations - FacICT - 2020
Dissertations - FacICTCIS - 2020

Files in This Item:
File Description SizeFormat 
20BITSD001.pdf
  Restricted Access
3.91 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.