Daniel Genkin, University of Michigan
From 15:30 until 16:30
At Zoom: https://ethz.zoom.us/j/99391091929
https://ethz.zoom.us/j/99391091929
Abstract:
The security and architecture communities will remember 2018 as the year of side channels. Starting from Spectre and Meltdown, time and again we have seen how basic performance-improving features can be exploited to violate fundamental hardware security guarantees. In this talk, I will survey a line of work on speculative execution attacks, showing how despite many mitigation efforts attackers can leak sensitive data across different address spaces and security domains.
Join the Zoom meeting at 15:30 on Thursday, December 3rd: https://ethz.zoom.us/j/99391091929