YoVDO

Lifting Compiler Security Properties to Stronger Attackers: The Speculation Case

Offered By: ACM SIGPLAN via YouTube

Tags

Speculative Execution Courses Branch Prediction Courses Side Channel Attacks Courses Formal Verification Courses Microarchitectural Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of compiler security properties in the context of speculative execution attacks during this 20-minute conference talk from ACM SIGPLAN's PriSC'24. Delve into the challenges of developing secure compiler passes against Spectre-like vulnerabilities, examining how different speculation mechanisms can be exploited by attackers. Investigate the limitations of current countermeasures that focus on specific attacker models, and learn about the need for more robust security guarantees. Discover a new formal framework designed to identify well-formedness conditions that enable compiler security even against stronger attacker models. Gain insights into the potential for extending these concepts beyond Spectre attacks, paving the way for more resilient compiler security in the face of evolving threats.

Syllabus

[PriSC'24] Lifting Compiler Security Properties to Stronger Attackers: the Speculation Cas...


Taught by

ACM SIGPLAN

Related Courses

Rage Against The Machine Clear
Hack In The Box Security Conference via YouTube
Secret Flaws of In-DRAM RowHammer Mitigations
Hack In The Box Security Conference via YouTube
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
USENIX via YouTube
Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU
IEEE via YouTube
Page Cache Attacks - Microarchitectural Attacks on Flawless Hardware
Black Hat via YouTube