Session:Microachitectural Attacks: Round Table
From 36C3 Wiki
Description | An open discussion of microarchitectural attacks: Spectre, Meltdown, side channels, and so on. What can we do and what should we do about them? |
---|---|
Website(s) | |
Type | Discussion |
Kids session | No |
Keyword(s) | security |
Person organizing | TheAlex |
Language | en - English |
Other sessions...
|
(Click here to refresh this page.)
Starts at | 2019/12/28 16:15 |
---|---|
Ends at | 2019/12/28 17:15 |
Duration | 60 minutes |
Location | Room:Seminar room 13 |
Let's meet and talk side channels (and not only)!
Topics of the discussion:
- Should I care?
- Do we really need to defend *all* systems against microarchitectural attacks and pay the full (and often high) price of the protection?
- If not, in which cases is the protection necessary and when is it superfluous?
- Practical defenses
- There are numerous proposed defense mechanisms: static analysis, HW extensions, alternative CPU architectures, OS-level isolation, and many many others.
- Yet, very few of them are used in practice. Why? What can we do to change it?
- Short-term vs mid-term vs long-term
- Which of the mechanisms are temporary solutions and which could solve the problem in the long run?
- Memory safety and speculative execution
If you want to come, please, ping me @oleksii_o to help with planning.