diff --git a/Part2-FlushReload/util.c b/Part2-FlushReload/util.c index 616ee59..4fde6a7 100755 --- a/Part2-FlushReload/util.c +++ b/Part2-FlushReload/util.c @@ -30,9 +30,6 @@ CYCLES measure_one_block_access_time(ADDR_PTR addr) /* * CLFlushes the given address. - * - * Note: clflush is provided to help you debug and should not be used in your - * final submission */ void clflush(ADDR_PTR addr) { diff --git a/report.md b/report.md index 422e468..d99c5f8 100644 --- a/report.md +++ b/report.md @@ -24,7 +24,8 @@ L3-DRAM threshold: ## 2-2 -**If the victim want to read the kth byte of a file, where k is a secret, how can he/she avoid leaking the secret to the attacker?** +**In the victim's pseudocode above, the victim attempts to load the data indexed by `flag` into the `value` variable. How can you change the victim's code to load the desired data without leaking the flag to the attacker?** + ## 3-1