Player is loading...

Embed

Embed code

Transcriptions

Note: this content has been automatically generated.
00:00:00
uh_huh the everybody's yep we have a great slides um so every day it's
00:00:07
if you use multiple computing devices which can include mobiles desktops or even servers
00:00:15
each of the that was that you see your on screen
00:00:18
represents of speculative execution vulnerability that has been discovered since twenty eighty
00:00:24
of special note are spectra knelt down but you might have heard off as well
00:00:28
as model spectre which isn't that that we worked on here at e. p. f. l.
00:00:33
so let's take a look into how these speculative execution vulnerabilities exposed
00:00:38
just suppose you have a recipe program is a lot like a
00:00:41
recipe and a chef does not necessarily perform all the steps in order
00:00:46
for example if the first asked for onions and there are no
00:00:50
onions in though in the pantry a chef can order these onions
00:00:55
while waiting for these onions is normally a chef will go ahead and perform later steps
00:01:00
in this case the chef can go ahead and cry in the collective which is necessary for the secret sauce
00:01:07
there are some side effects to this specifically for the car like you have a smell which remains
00:01:13
and that is how willie secrets so that's to construct look into what a typical attacked looks like in the first step
00:01:21
uh attacker forces of victim to be speculate and perform some secret dependent work
00:01:26
so what the victim is doing the secret dependent work in other we're what's making the garlic based
00:01:32
you it should be some smell with the attacker can come in and read to figure out what the secrets were
00:01:38
so in our in my research i'm trying to stop the attacker at each of these steps
00:01:43
forced i'm trying to see an improvement miss speculation on a victim
00:01:48
and if not can we make sure that the victim does not create if any secret depend traces
00:01:54
the final step of our defence you're trying to make sure that an attacker is unable to read
00:01:59
these traces and in fact the the secrets thank

Share this talk: 


Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
Introduction
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Introduction
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and who-is-th.at
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.