by Caroline Trippel on Aug 12, 2020 | Tags: ISCA, Security, Verification
Prof. Christopher Fletcher (UIUC), Dr. Frank McKeen (Intel), Prof. Edward Suh (Cornell), and I served as panelists for the 2020 ISCA Security Mini-Panel. This blog post reflects on our panel discussion. The security of modern applications is underpinned by the...
Read more...
by Dmitry Ponomarev on Jun 9, 2020 | Tags: Conference, Security
In an earlier blog post, we argued that computer architects working on security problems should follow security conferences. In this post, we highlight some of the recent results from this year’s events that may be of interest to our community. While security...
Read more...
by Dmitry Ponomarev on Mar 31, 2020 | Tags: Security
Security has recently emerged as a first-class design consideration and an active research area in computer architecture community, with most top-tier conferences dedicating one or more sessions to security topics. Best Paper Awards at two most recent MICRO...
Read more...
by Adam Hastings, Simha Sethumadhavan on Oct 25, 2019 | Tags: Architecture, Security
When it comes to hardware support to mitigate software security issues, there is a significant gap between what is available in products today and known solutions. This article examines the history of architectural support, summarizes research philosophies, and delves...
Read more...
by Simha Sethumadhavan, Steven M. Bellovin, Paul Kocher, Ed Suh on Feb 7, 2019 | Tags: Opinion, Security
In a recent opinion post on security disclosures, Uht questions if the public disclosure of hardware security vulnerabilities has had any benefits, and suggests that it would be better not to disclose these vulnerabilities. As Uht points out, debate on security...
Read more...