[pl-seminar] Talk by Wolfgang Kunz April 9 11:00am 2310 CS (formal work re Meltdown/Spectre)


Date: Mon, 08 Apr 2019 21:26:00 +0000
From: "Mark D. Hill" <markhill@cs.wisc.edu>
Subject: [pl-seminar] Talk by Wolfgang Kunz April 9 11:00am 2310 CS (formal work re Meltdown/Spectre)
Reminder of talk tomorrow (Tuesday) 11am.

Begin forwarded message:

From: "Mark D. Hill" <markhill@cs.wisc.edu>
Subject: [Architecture] Talk by Wolfgang Kunz April 9 11:00am 2310 CS (formal work re Meltdown/Spectre)
Date: April 4, 2019 at 2:23:49 PM CDT

FYI: Wolfgang Kunz of Technische UniversitÃt Kaiserslautern (TUK) https://www.eit.uni-kl.de/en/eis/people/kunz/) and an expert on formal methods for preventing Meltdown/Spectre is visiting next Tuesday (Apr 9) and giving a talk at 11am in 2310 CS (https://today.wisc.edu/events/view/135280).
 
Talk info below as well as a few recent papers by him. Sorry if the talk is at a bad time for you but there were many constraints.
 
--Mark
 
         SUBMIT AN EVENT

PROCESSOR HARDWARE SECURITY DETECTION BY UNIQUE PROGRAM EXECUTION CHECKING â WOLFGANG KUNZ

EVENT DETAILS

DATE
Tuesday, April 9, 2019
TIME
11 a.m.-12 p.m.
DESCRIPTION
Recent discovery of security attacks in advanced processors, known as Spectre and Meltdown, has resulted in high public alertness about security of hardware. The root cause of these attacks is information leakage across covert channels that reveal secret data without any explicit information flow between the secret and the attacker. Many sources believe that such covert channels are intrinsic to highly advanced processor architectures based on speculation and out-of-order execution, suggesting that such security risks can be avoided by staying away from high-end processors. This talk, however, presents research results which show that the problem is of wider scope: we present a new class of covert channel attacks which are possible in average-complexity processors with in-order pipelining, as they are mainstream in applications ranging from Internet-of-Things to Autonomous Systems. We present a new approach as a foundation for remedy against covert channels: while all previous attacks were found by clever thinking of human attackers, this talk presents a formal method called Unique Program Execution Checking which detects and locates vulnerabilities to covert channels systematically, including those to covert channels unknown so far. A detailed report on the presented research results can be found in arXiv:1812.04975, 2018. This is joint work with Mohammad R. Fadiheh (TUK), Dominik Stoffel (TUK), Clark Barrett (Stanford), and Subhasish Mitra (Stanford).

Speaker: Wolfgang Kunz, Technische UniversitÃt Kaiserslautern (TUK), Germany

Coffee and cookies will be available.

COST
Free

TAGS

         Computer sciences

Add this event to your calendar:

 
Example papers:

  C. Villarraga, D. Stoffel, W. Kunz. Software in a Hardware View. In: Drechsler R. (eds) Formal System Verification. Pages 123-154. ISBN 978-3-319-57685-5 Springer, Cham. 2018

  T. Fehmel, D. Stoffel, W. Kunz: âGeneration of Abstract Driver Models for IP Integration Verificationâ, IEEE Transactions on Emerging Topics in Computing, 2018.

  M.R. Fadiheh, S.S. Nuthakki, S. Mitra, C. Barrett, D. Stoffel, W. Kunz: âSymbolic quick error detection using symbolic initial state for pre-silicon verification.â In Design, Automation Test in Europe Conference Exhibition (DATE), 2018 (pp. 55-60). 

  M.R. Fadiheh, D. Stoffel, S. Mitra, C. Barrett, W. Kunz: âProcessor hardware security vulnerabilities and their detection by unique program execution checkingâ. Design, Automation Test in Europe Conference Exhibition (DATE), 2019. (accepted)
 

 

-----------------------------------------------------------------
List admin http://lists.cs.wisc.edu/mailman/listinfo/architecture
or email markhill@cs.wisc.edu

_______________________________________________
Pl-seminar mailing list
Pl-seminar@cs.wisc.edu
https://lists.cs.wisc.edu/mailman/listinfo/pl-seminar
[← Prev in Thread] Current Thread [Next in Thread→]
  • [pl-seminar] Talk by Wolfgang Kunz April 9 11:00am 2310 CS (formal work re Meltdown/Spectre), Mark D. Hill <=