Join the 2nd edition of our Researcher Talk Series!
Faulting Hardware from Software
Fault attacks induce incorrect behavior into a system, enabling the compromise of the entire system and the disclosure of confidential data. Traditionally, fault attacks required hardware equipment and local access. In the past five years multiple fault attacks have been discovered that do not require local access, as they can be mounted from software. We will discuss the Rowhammer attack and how it can subvert a system. We then show that a new primitive, Plundervolt, can similarly lead to a system compromise and information disclosure.
Agenda
14:00 -14:30: Talk by Daniel Gruß
14:30-15:00: Discussion
Speaker
Daniel Gruss, IAIK Graz University of Technology
Daniel Gruss (@lavados) is an Assistant Professor at Graz University of Technology. He finished his PhD with distinction in less than three years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel’s research focuses on side channels and security on the hardware-software boundary. His research team was involved in several vulnerability disclosures, including Meltdown and Spectre. He has co-authored more than 20 top-tier academic publications in the past five years and received several prizes for his research.
Free Registration
Please reach out to us at events@sba-reserarch.org if you would like to join.
hosted by Vienna ACM SIGSAC Chapter.