BEGIN:VCALENDAR
VERSION:2.0
PRODID:icalendar-ruby
CALSCALE:GREGORIAN
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Europe/Vienna
BEGIN:DAYLIGHT
DTSTART:20200329T030000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20191027T020000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260406T074257Z
UID:5dcbbba009abe090678728@ist.ac.at
DTSTART:20191205T163000
DTEND:20191205T180000
DESCRIPTION:Speaker: Daniel Gruss\nhosted by Dan Alistarh\nAbstract: In thi
 s talk we will first discuss traditional software-based side-channel attac
 ks and then look at different transient execution attacks and defenses. We
  will discuss the differences between all the Spectre variants in terms of
  microarchitectural (prediction) elements\, the attacker model\, and the a
 ttack strategy. We will discuss blank spots that we should look at in the 
 future. With this knowledge we are prepared to discuss which defenses agai
 nst transient execution attacks are effective. We will see that there are 
 good defenses\, but most are neither effective nor efficient. Finally\, we
  will discuss open problems for defenses.
LOCATION:Foyer seminar room Ground floor / Office Bldg West (I21.EG.128)\, 
 ISTA
ORGANIZER:cpetz@ist.ac.at
SUMMARY:Daniel Gruss: Side Channels and Transient Execution Attacks
URL:https://talks-calendar.ista.ac.at/events/2409
END:VEVENT
END:VCALENDAR
