Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks
EE380: Computer Systems Colloquium Seminar
Exploiting modern microarchitectures: Meltdown, Spectre, and other hardware attacks
Speaker: Jon Masters, Redhat
Recently disclosed vulnerabilities against modern high performance computer microarchitectures known as 'Meltdown' and 'Spectre' are among an emerging wave of hardware focused attacks. These include cache
side channel exploits against underlying shared resources, which arise as a result of common industry-wide performance optimizations. More broadly, attacks against hardware are entering a new phase of
sophistication that will see more in the months ahead. This talk will describe several of these attacks, how they can be mitigated, and generally what we can do as an industry to bring performance without
trading security.
About the Speaker:
Jon Masters is a Computer Architect at Red Hat, where he was tech lead for mitigation efforts against Meltdown and Spectre. Jon has worked closely with high performance microprocessor design teams for years
on emerging alternative server platforms, and also currently leads the CCIX software working group helping to define high performance cache coherent interconnects for workload acceleration. Jon has been a
Linux developer for 22 years, since beginning college at the age of 13, and has authored a number of books on Linux technology. He lives in Cambridge, MA, and will run his 11th marathon later this spring.
For more information about this seminar and its speaker, you can visit https://ee380.stanford.edu/Abstracts/180131.html
Support for the Stanford Colloquium on Computer Systems Seminar Series provided by the Stanford Computer Forum.
Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from integrated circuits to operating
systems and programming languages. It is free and open to the public, with new lectures each week.
Learn more: http://bit.ly/WinYX5
Видео Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks канала stanfordonline
Exploiting modern microarchitectures: Meltdown, Spectre, and other hardware attacks
Speaker: Jon Masters, Redhat
Recently disclosed vulnerabilities against modern high performance computer microarchitectures known as 'Meltdown' and 'Spectre' are among an emerging wave of hardware focused attacks. These include cache
side channel exploits against underlying shared resources, which arise as a result of common industry-wide performance optimizations. More broadly, attacks against hardware are entering a new phase of
sophistication that will see more in the months ahead. This talk will describe several of these attacks, how they can be mitigated, and generally what we can do as an industry to bring performance without
trading security.
About the Speaker:
Jon Masters is a Computer Architect at Red Hat, where he was tech lead for mitigation efforts against Meltdown and Spectre. Jon has worked closely with high performance microprocessor design teams for years
on emerging alternative server platforms, and also currently leads the CCIX software working group helping to define high performance cache coherent interconnects for workload acceleration. Jon has been a
Linux developer for 22 years, since beginning college at the age of 13, and has authored a number of books on Linux technology. He lives in Cambridge, MA, and will run his 11th marathon later this spring.
For more information about this seminar and its speaker, you can visit https://ee380.stanford.edu/Abstracts/180131.html
Support for the Stanford Colloquium on Computer Systems Seminar Series provided by the Stanford Computer Forum.
Colloquium on Computer Systems Seminar Series (EE380) presents the current research in design, implementation, analysis, and use of computer systems. Topics range from integrated circuits to operating
systems and programming languages. It is free and open to the public, with new lectures each week.
Learn more: http://bit.ly/WinYX5
Видео Stanford Seminar - Exploiting modern microarchitectures: Meltdown, Spectre, & other hardware attacks канала stanfordonline
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
“Un-patchable” New Intel CPU Flaw!CppCon 2018: Chandler Carruth “Spectre: Secrets, Side-Channels, Sandboxes, and Security”Meltdown And SpectreSpectre and Meltdown attacks explained understandablySpectre & Meltdown - ComputerphileIntel Processor Generations As Fast As Possible *CORRECTED*Was Windows Vista THAT bad?Onur Mutlu - Future Computing Platforms: Challenges & Opportunities: Invited Talk at IEEE CS TurkeyThe von Neumann and Harvard ArchitecturesRunning a Buffer Overflow Attack - ComputerphileUSENIX Security '18 - Foreshadow: Extracting the Keys to the Intel SGX Kingdom...Seminar in Computer Architecture - Lecture 1: Introduction and Basics (Spring 2021)Manual Spinning Lathe D60Windows Registry As Fast As PossiblePerformance x64: Cache Blocking (Matrix Blocking)Stanford Seminar - Extended Reality for EverybodyMeltdown explained like you're fiveMeltdown & Spectre vulnerabilities - Simply ExplainedProject Zero: Five Years of 'Make 0Day Hard'