3. PROBLEM / MOTIVATION
Security of the computer system is breaches
as the Spectre attack open up the possibiliti
for dangerous attacks.
Attacker may use side-channel attack to
hijack the data.
4. OBJECTIVES
• To study the vulnerability of Spectre attack
towards the computer system.
• To study the technique used to mitigate
the Spectre attack.
• To mitigate the Spectre attack using
Retpoline technique in simulator.
7. SCOPE & FRAMEWORK
Research about
Spectre Attack &
Retpoline Technique
Installation of VMWare
workstation as the
virtual machine
Installation and
Configuration of Ubuntu in
the VMWare workstation
Installation and Configuration of
NS3 in Ubuntu. Eclipse IDE is
installed to compiled the
simulation codes and Retpoline
codes which is in C++
Netanim is one of the features in
NS3. It is used to simulate the set
up network and Retpoline
The simulation is then observed
and studied through the features
of GNU plot in NS3
11. • a software construct
• allow indirect branches to be
isolated from speculative
execution
• protect sensitive binaries (such
as operating system or hypervisor
implementations) from branch
target injection attacks against
their indirect branches.
• a trampoline construct
constructed using return
operations ensures that any
associated speculative execution
will “bounce” endlessly.
• imagine speculative execution as
an overly energetic 7-year old
that we must now build a
warehouse of trampolines around