Talk 3

Anil Kurmus, IBM Research – Zurich


Speculative execution attacks: The new memory corruption?

In this talk, we draw a parallel between transient execution attacks and memory corruption, arguing that there will be strong defenses for some categories (e.g., fault-based transient execution attacks), while other attack categories are here to stay (e.g., Spectre v1). We will touch on what we believe fruitful mitigation strategies for the remaining attacks are, namely a combination of careful threat modeling for applications, augmented ISAs and compiler support, hopefully opening to a lively hallway discussion.

@conference {238888,
title = {Talk 3},
year = {2019},
address = {Santa Clara, CA},
publisher = {USENIX Association},
month = aug,