InfoQ Homepage Presentations How Performance Optimizations Shatter Security Boundaries
How Performance Optimizations Shatter Security Boundaries
Summary
Moritz Lipp explains how the Meltdown and Spectre vulnerabilities exploit hardware optimizations to read otherwise inaccessible data processed on the computer. He explains the background to understand the underlying issue and the uncomfortable security consequences they bring, and why it is no coincidence that four teams of researchers discovered the same vulnerabilities in the same time frame.
Bio
Moritz Lipp is a researcher in information security at Graz University of Technology. He is pursuing his PhD with a strong focus on microarchitectural side-channel attacks on personal computers and mobile devices at the Institute of Applied Information Processing and Communications. His research has been published at top academic conferences and presented on different venues around the world.
About the conference
Software is changing the world. QCon empowers software development by facilitating the spread of knowledge and innovation in the developer community. A practitioner-driven conference, QCon is designed for technical team leads, architects, engineering directors, and project managers who influence innovation in their teams.