Version V.1.0.0

lecture: Preventing CPU side-channel attacks with kernel tracking

Event_large

Marian will present a protection from Meltdown/Spectre types of attacks.
He will also show, why this mechanism provides protection from future
attacks based on the same side-channel approach.

Updating microcode and losing performance, because of that update is a big concern for everyone. So Marian will show his team's work on how they decided to fight the attacks and what their solution gives and what it lacks.

The team's point is that there is no valid case for a child program or
thread to keep dying and this is what is the primary technique for executing cache side-channel attacks.

So monitoring dying processes allows for marking processes that try to attack us.

Marian will provide examples and a demo of their prevention mechanism. He will also share the team's work on how they have used TSX instruction statistics to check for TSX based cache side-channel attacks.

As a side effect, this protection mechanism can help mitigate (somewhat) all attacks that use this kind of attack vector.

Info

Day: 2018-09-14
Start time: 15:45
Duration: 01:00
Room: Tesla

Links:

Feedback

Click here to let us know how you liked this event.

Concurrent events