Panel On the Implications of the Meltdown & Spectre Design Flaws
Computer Architecture 1.0 specifies the timing-independent functional behavior of a computer, while Micro-Architecture is the implementation techniques that improve performance. What if a computer that is completely correct by Architecture 1.0 can be made to leak protected information via timing, a.k.a., Micro-Architecture? This is done by the Meltdown and Spectre design flaws that were broadly revealed in January 2018. Meltdown leaks kernel memory, but software & hardware fixes exist. Spectre leaks memory outside of sandboxes and bounds checks, and it is scary.
This panel will explore implications of Meltdown and Spectre, especially that the definition of Architecture 1.0 is inadequate to protect information.
Going forward, is it time for Architecture 2.0 and, if so, what is it? If not, do we go forward with micro-architecture best practices and, if so, what are they?
Presentation from the panel is accessible here.
Moderator
Mark D. Hill, University of Wisconsin-Madison
Panelists
Paul Kocher, Independent
Ruby B. Lee, Princeton University
Simha Sethumadhavan, Columbia University and Chip Scan Inc.
Timothy Sherwood, UC Santa Barbara and Tortuga Logic
When
12:00pm on Monday June 4, 2018