YoVDO

Lifting Compiler Security Properties to Stronger Attackers: The Speculation Case

Offered By: ACM SIGPLAN via YouTube

Tags

Speculative Execution Courses Branch Prediction Courses Side Channel Attacks Courses Formal Verification Courses Microarchitectural Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of compiler security properties in the context of speculative execution attacks during this 20-minute conference talk from ACM SIGPLAN's PriSC'24. Delve into the challenges of developing secure compiler passes against Spectre-like vulnerabilities, examining how different speculation mechanisms can be exploited by attackers. Investigate the limitations of current countermeasures that focus on specific attacker models, and learn about the need for more robust security guarantees. Discover a new formal framework designed to identify well-formedness conditions that enable compiler security even against stronger attacker models. Gain insights into the potential for extending these concepts beyond Spectre attacks, paving the way for more resilient compiler security in the face of evolving threats.

Syllabus

[PriSC'24] Lifting Compiler Security Properties to Stronger Attackers: the Speculation Cas...


Taught by

ACM SIGPLAN

Related Courses

Ret2spec- Speculative Execution Using Return Stack Buffers
Association for Computing Machinery (ACM) via YouTube
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube
Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube
Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube
High-Assurance Cryptography in the Spectre Era
IEEE via YouTube