[Sysreading] SRG for 1/26: Meltdown and Spectre

James Davis davisjam at vt.edu
Sun Jan 21 16:57:32 EST 2018


Hi all,

This week we'll move (much) further into the systems and security domains.

I'm sure most if not all of you have heard about the Meltdown and Spectre
attacks, published over Christmas break.

This week we will study the technical papers describing these security
vulnerabilities.

*Papers*
Half of us will read one paper, half the other.
We will discuss both at the meeting.
Sign up here
<https://docs.google.com/spreadsheets/d/1-wHcyi_K_W888DjWj0cZEX55fwdE1WTiOumlp6f0roI/edit?usp=sharing>
!

1. Meltdown <https://meltdownattack.com/meltdown.pdf>: Lipp, Schwarz,
Gruss, Prescher, Haas, Mangard, Kocher, Genkin, Yarom, Hamburg. arXiv 2018.
2. Spectre <https://spectreattack.com/spectre.pdf>. Kocher, Genkin, Gruss,
Haas, Hamburg, Lipp, Mangard, Prescher, Schwarz, and Yarom. arXiv 2018.

For the paper you *don't* read, you might want to look through Adrian
Colyer's treatment on The Morning Paper.
1. Abridged: Meltdown <https://blog.acolyer.org/2018/01/15/meltdown/>
2. Abridged: Spectre
<https://blog.acolyer.org/2018/01/16/spectre-attacks-exploiting-speculative-execution/>

*Logistics*
"The usual": Friday 1/26, 3:30-5:00 PM, KW2 2225.

*RSVP*
Your paper sign-up is your RSVP.

Cheers,

Jamie

-- 
Jamie Davis
PhD student, Computer Science, 2015-?
Virginia Tech
http://people.cs.vt.edu/~davisjam/

<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail&utm_term=icon>
Virus-free.
www.avast.com
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail&utm_term=link>
<#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.cs.vt.edu/pipermail/sysreading/attachments/20180121/fc13779d/attachment.html>


More information about the Sysreading mailing list