Microarchitecture Security Roundtable
(This event is over, and you may read the event report below!)
This roundtable aims to produce a set of research topics in the area of microarchitecture security. The 2017 Spectre and Meltdown vulnerabilities have shown the world that these problems are real. Given the unique nature of microarchitecture security, topics and research areas should cover many aspects of discovery and mitigation. Through joint research conducted by Red Hat and Boston University, we will determine which technologies can be integrated into upstream projects Red Hat supports, or if necessary into other projects that will provide a long-term home for them.
- 8:00-8:30: Opening and Introductions
- Includes a vision/problem statement from Jon Masters and introductions around the room.
- 8:30-9:35: Microarchitecture Security Topic Overview
- Structured group activity to exhaustively list and synthesize research areas and topics connected to microarchitecture security in order to generate a prioritized list of topics.
- 9:45-10:05: Topics to Upstreams Mapping
- Structured group activity to create a map of people, projects, and upstreams related to each of the research topics / areas.
- 10:05-10:45: Detailed technical discussions / next steps game planning
- Planning exercise for next steps in each topic area in order to get relevant technology upstreamed for the long term.
- 11:00 – 12:00: Open time to address parking-lot items from first three hours.
- Resolve roadmap questions, research areas.
- 12:00 – 1:00: Lunch (provided)
Preparing for the Roundtable
Before the roundtable you’ll want to:
- Review the background reading for the event, available here.
Contact the Collaboratory with any questions you may have about this event.