Blogs (61) >>
Wed 18 Jul 2018 14:00 - 14:30 at Hamburg - WoSSCA 2 Chair(s): Eric Jul

The recently discovered Spectre and Meltdown vulnerabilities have shown that speculative execution can inappropriately bypass safety checks in programs and lead to information leakage. Speculative execution mechanisms in hardware are carefully designed to restore architectural state upon detecting misspeculation. Yet unlike {\em architectural state}, which is the hardware state that is by definition visible to software, the microarchitectural state, or μ-state, is designed to be invisible to software and therefore is mostly not restored upon detection of misspeculation. Hardware uses μ-state to learn about program behavior and exploit both spatial and temporal locality in order to improve performance. That means that invisible μ-state directly affects the execution time of programs which constitutes a side-channel to reveal information about execution during speculation. One variant of Spectre showed how the contents of private memory can be encoded into μ-state by an attacker who has bypassed safety checks in speculative execution.

Wed 18 Jul

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

14:00 - 15:30
WoSSCA 2WoSSCA at Hamburg
Chair(s): Eric Jul University of Oslo
14:00
30m
Talk
Peering behind the Turing Mirror
WoSSCA
14:30
30m
Talk
Hardware and Software Mitigations
WoSSCA
15:00
30m
Talk
Pacer: Efficient I/O Side-Channel Mitigation in the Cloud
WoSSCA
Aastha Mehta MPI-SWS