Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Within this website:
External resources:
Within this website:
External resources:
  • the dblp Computer Science Bibliography

Dagstuhl Seminar 23481

MAD: Microarchitectural Attacks and Defenses

( Nov 26 – Dec 01, 2023 )

(Click in the middle of the image to enlarge)

Please use the following short url to reference this page:



Dagstuhl Reports

As part of the mandatory documentation, participants are asked to submit their talk abstracts, working group results, etc. for publication in our series Dagstuhl Reports via the Dagstuhl Reports Submission System.

  • Upload (Use personal credentials as created in DOOR to log in)

Dagstuhl Seminar Wiki

Shared Documents

  • Upload (Use personal credentials as created in DOOR to log in)


Microarchitectural attacks, such as Spectre and Meltdown, are a recent class of security threats that affect almost all modern processors. These attacks target the hardware/software interface by exploiting the side-effects (like subtle timing differences in a program's execution time) resulting from a processor's internal optimizations to compromise a system's security. They affect a wide range of processors (from smartphone to server processors) and can be used to bypass and circumvent many software-level security mechanisms. Building systems that are resistant against such attacks requires fundamentally rethinking the design of hardware and software security mechanisms.

Recently, there has been a significant amount of research on (a) characterizing the microarchitectural side-effects of existing processors, (b) identifying new microarchitectural attacks, (c) developing hardware and software mechanisms for mitigating attacks, and (d) developing techniques for reasoning about microarchitectural leaks in hardware and software designs. Unfortunately, these research efforts originate from different research areas-computer security, computer architectures, applied cryptography, programming languages and verification-with only limited interactions across areas.

The Microarchitectural Attacks and Defenses (MAD) Dagstuhl Seminar will gather together leading researchers that are working on security at the hardware-software interface. This will provide an opportunity for (1) presenting a comprehensive overview of current advances in microarchitectural attacks and defenses, (2) fostering interaction and collaboration between researchers from different research communities, and (3) identifying new research directions and open challenges that need to be addressed to build systems resistant to microarchitectural attacks.

Copyright Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, and Clémentine Maurice


  • Cryptography and Security
  • Hardware Architecture
  • Programming Languages

  • microarchitectural attacks
  • hardware-software co-design for security
  • security architectures
  • side-channel analysis