The last few months have seen an exodus of attacks like Meltdown and Spectre, SPOILER, Zombieload, and SWAPGS. Each attack finds a new vulnerability that can bypass the isolation installed. Most of these attacks are not easily prevented. Every software patch developed has huge performance penalties. These recent developments have led to several questions and open challenges.
Where did we go wrong with processor design? Are there any more of such attacks yet to come? How do we build efficient countermeasures? How should processors be designed that can prevent all attacks, present and future? How do we verify and validate processors for security? Where do we tradeoff between performance and security?
This workshop, a part of Shakti Week, will gather experts from industry and academia to discuss and ponder about these questions. The workshop would have two full days of invited talks, panel discussions, and poster sessions, focussed on security with the hope of laying the foundations for safe and secure future microprocessors.