Player is loading...


Embed code


Note: this content has been automatically generated.
uh_huh the everybody's yep we have a great slides um so every day it's
if you use multiple computing devices which can include mobiles desktops or even servers
each of the that was that you see your on screen
represents of speculative execution vulnerability that has been discovered since twenty eighty
of special note are spectra knelt down but you might have heard off as well
as model spectre which isn't that that we worked on here at e. p. f. l.
so let's take a look into how these speculative execution vulnerabilities exposed
just suppose you have a recipe program is a lot like a
recipe and a chef does not necessarily perform all the steps in order
for example if the first asked for onions and there are no
onions in though in the pantry a chef can order these onions
while waiting for these onions is normally a chef will go ahead and perform later steps
in this case the chef can go ahead and cry in the collective which is necessary for the secret sauce
there are some side effects to this specifically for the car like you have a smell which remains
and that is how willie secrets so that's to construct look into what a typical attacked looks like in the first step
uh attacker forces of victim to be speculate and perform some secret dependent work
so what the victim is doing the secret dependent work in other we're what's making the garlic based
you it should be some smell with the attacker can come in and read to figure out what the secrets were
so in our in my research i'm trying to stop the attacker at each of these steps
forced i'm trying to see an improvement miss speculation on a victim
and if not can we make sure that the victim does not create if any secret depend traces
the final step of our defence you're trying to make sure that an attacker is unable to read
these traces and in fact the the secrets thank

Share this talk: 

Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.