Dagstuhl Seminar 23481
MAD: Microarchitectural Attacks and Defenses
( Nov 26 – Dec 01, 2023 )
Permalink
Organizers
- Christopher W. Fletcher (University of Illinois - Urbana-Champaign, US)
- Marco Guarnieri (IMDEA Software Institute - Madrid, ES)
- David Kohlbrenner (University of Washington - Seattle, US)
- Clémentine Maurice (CNRS - CRIStAL, Lille, FR)
Contact
- Marsha Kleinbauer (for scientific matters)
- Jutka Gasiorowski (for administrative matters)
Dagstuhl Reports
As part of the mandatory documentation, participants are asked to submit their talk abstracts, working group results, etc. for publication in our series Dagstuhl Reports via the Dagstuhl Reports Submission System.
- Upload (Use personal credentials as created in DOOR to log in)
Dagstuhl Seminar Wiki
- Dagstuhl Seminar Wiki (Use personal credentials as created in DOOR to log in)
Shared Documents
- Dagstuhl Materials Page (Use personal credentials as created in DOOR to log in)
Schedule
- Upload (Use personal credentials as created in DOOR to log in)
Microarchitectural attacks, such as Spectre and Meltdown, are a recent class of security threats that affect almost all modern processors. These attacks target the hardware/software interface by exploiting the side-effects (like subtle timing differences in a program's execution time) resulting from a processor's internal optimizations to compromise a system's security. They affect a wide range of processors (from smartphone to server processors) and can be used to bypass and circumvent many software-level security mechanisms. Building systems that are resistant against such attacks requires fundamentally rethinking the design of hardware and software security mechanisms.
Recently, there has been a significant amount of research on (a) characterizing the microarchitectural side-effects of existing processors, (b) identifying new microarchitectural attacks, (c) developing hardware and software mechanisms for mitigating attacks, and (d) developing techniques for reasoning about microarchitectural leaks in hardware and software designs. Unfortunately, these research efforts originate from different research areas-computer security, computer architectures, applied cryptography, programming languages and verification-with only limited interactions across areas.
The Microarchitectural Attacks and Defenses (MAD) Dagstuhl Seminar will gather together leading researchers that are working on security at the hardware-software interface. This will provide an opportunity for (1) presenting a comprehensive overview of current advances in microarchitectural attacks and defenses, (2) fostering interaction and collaboration between researchers from different research communities, and (3) identifying new research directions and open challenges that need to be addressed to build systems resistant to microarchitectural attacks.

- Gilles Barthe (MPI-SP - Bochum, DE) [dblp]
- Thomas Bourgeat (EPFL - Lausanne, CH) [dblp]
- Billy Brumley (Rochester Institute of Technology, US) [dblp]
- Sunjay Cauligi (MPI-SP - Bochum, DE) [dblp]
- Chitchanok Chuengsatiansup (The University of Melbourne, AU) [dblp]
- Jesse De Meulemeester (KU Leuven, BE) [dblp]
- Thomas Eisenbarth (Universität Lübeck, DE) [dblp]
- Michael Flanders (University of Washington - Seattle, US) [dblp]
- Christopher W. Fletcher (University of Illinois - Urbana-Champaign, US) [dblp]
- Anders Fogh (Intel - Neubiberg, DE) [dblp]
- Daniel Gruss (TU Graz, AT) [dblp]
- Marco Guarnieri (IMDEA Software Institute - Madrid, ES) [dblp]
- David Kohlbrenner (University of Washington - Seattle, US) [dblp]
- Boris Köpf (Microsoft Research - Cambridge, GB) [dblp]
- Steve Kremer (INRIA Nancy - Grand Est, FR) [dblp]
- Anil Kurmus (IBM Research-Zurich, CH) [dblp]
- Moritz Lipp (Amazon Web Services - Wien, AT) [dblp]
- Aastha Mehta (University of British Columbia - Vancouver, CA) [dblp]
- Nicky Mouha (NIST - Gaithersburg, US) [dblp]
- Onur Mutlu (ETH Zürich, CH) [dblp]
- Hamed Nemati (CISPA - Saarbrücken, DE) [dblp]
- Yossi Oren (Ben Gurion University - Beer Sheva, IL) [dblp]
- Riccardo Paccagnella (Carnegie Mellon University - Pittsburgh, US) [dblp]
- Kaveh Razavi (ETH Zürich, CH) [dblp]
- Alastair Reid (Intel - London, GB) [dblp]
- Jan Reineke (Universität des Saarlandes - Saarbrücken, DE) [dblp]
- Tamara Rezk (INRIA - Sophia Antipolis, FR) [dblp]
- Eyal Ronen (Tel Aviv University, IL) [dblp]
- Gururaj Saileshwar (University of Toronto, CA) [dblp]
- Michael Schwarz (CISPA - Saarbrücken, DE) [dblp]
- Mark Silberstein (Technion - Haifa, IL) [dblp]
- Caroline Trippel (Stanford University, US) [dblp]
- Jo Van Bulck (KU Leuven, BE) [dblp]
- Ingrid Verbauwhede (KU Leuven, BE) [dblp]
- Hugo Vincent (Arm - Cambridge, GB) [dblp]
Classification
- Cryptography and Security
- Hardware Architecture
- Programming Languages
Keywords
- microarchitectural attacks
- hardware-software co-design for security
- security architectures
- side-channel analysis