{"id":583,"date":"2018-04-24T16:55:04","date_gmt":"2018-04-24T20:55:04","guid":{"rendered":"https:\/\/www.bu.edu\/rhcollab\/?page_id=583"},"modified":"2018-07-23T08:59:49","modified_gmt":"2018-07-23T12:59:49","slug":"microarchitecture-security-roundtable","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/rhcollab\/events\/archive\/microarchitecture-security-roundtable\/","title":{"rendered":"Microarchitecture Security Roundtable"},"content":{"rendered":"<p><script type=\"text\/javascript\" src=\"https:\/\/addevent.com\/libs\/atc\/1.6.1\/atc.min.js\" async defer><\/script><\/p>\n<aside style=\"float: right; margin: 10px; margin-left: 24px; min-width: 100px; max-width: 200px;\">\n<h4>Dates &amp; Times<\/h4>\n<p>Friday April 27, 2018<br \/>\n8:00 AM &#8211; 12:00 PM<br \/>\n(Breakfast and lunch will be provided)<\/p>\n<div title=\"Add to Calendar\" class=\"addeventatc\" style=\"margin-bottom: 30px;\">Add to Calendar<br \/>\n<span class=\"start\">04\/27\/2018 08:00 AM<\/span><br \/>\n<span class=\"end\">04\/27\/2018 12:00 PM<\/span><br \/>\n<span class=\"timezone\">America\/New_York<br \/>\n<\/span><br \/>\n<span class=\"title\">Microarchitecture Security Roundtable<\/span><br \/>\n<span class=\"description\">This roundtable aims to produce a set of research topics in the area of microarchitecture security. The 2017 Spectre and Meltdown vulnerabilities have shown the world that these problems are real.  Given the unique nature of microarchitecture security, topics and research areas should cover many aspects of discovery and mitigation.  Through joint research conducted by Red Hat and Boston University, we will determine which technologies can be integrated into upstream projects Red Hat supports, or if necessary into other projects that will provide a long-term home for them.<\/span><br \/>\n<span class=\"location\">Open Innovation Lab, 3rd floor at Red Hat, Inc. 300 A Street, Boston MA 02210<\/span><\/div>\n<h4>Location<\/h4>\n<address style=\"font-style: normal;\">Red Hat, Inc.<br \/>\nOpen Innovation Lab<br \/>\n3rd Floor<br \/>\n300 A Street<br \/>\nBoston, MA 02210<\/address>\n<p><a href=\"https:\/\/www.google.com\/maps\/dir\/\/300+A+St,+Boston,+MA+02210\/@42.3545634,-71.05622,15.5z\/data=!4m8!4m7!1m0!1m5!1m1!1s0x89e37a7fd3456fff:0x5b2d0cc07ce659ae!2m2!1d-71.0502875!2d42.3486988?hl=en\">Directions<\/a><\/p>\n<h4>Attend Online<\/h4>\n<p>If you are unable to make it to the event in person, you may attend online via video conferencing at the following link: <a href=\"https:\/\/bluejeans.com\/6465206828\">https:\/\/bluejeans.com\/6465206828<\/a><br \/>\n<\/aside>\n<p>(This event is over, and you may read the event report below!)<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"yWetrvR3mm\"><p><a href=\"https:\/\/www.bu.edu\/rhcollab\/2018\/06\/18\/microarchitecture-security-roundtable-report\/\">Microarchitecture Security Roundtable Report<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Microarchitecture Security Roundtable Report&#8221; &#8212; Red Hat Collaboratory\" src=\"https:\/\/www.bu.edu\/rhcollab\/2018\/06\/18\/microarchitecture-security-roundtable-report\/embed\/#?secret=yWetrvR3mm\" data-secret=\"yWetrvR3mm\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>This roundtable aims to produce a set of research topics in the area of microarchitecture security. The 2017 Spectre and Meltdown vulnerabilities have shown the world that these problems are real.  Given the unique nature of microarchitecture security, topics and research areas should cover many aspects of discovery and mitigation. Through joint research conducted by Red Hat and Boston University, we will determine which technologies can be integrated into upstream projects Red Hat supports, or if necessary into other projects that will provide a long-term home for them.<\/p>\n<h3>Agenda<\/h3>\n<ul>\n<li>8:00-8:30: <strong>Opening and Introductions<\/strong>\n<ul>\n<li>Includes a vision\/problem statement from Jon Masters and introductions around the room.<\/li>\n<\/ul>\n<\/li>\n<li>8:30-9:35: <strong>Microarchitecture Security Topic Overview<\/strong>\n<ul>\n<li>Structured group activity to exhaustively list and synthesize research areas and topics connected to microarchitecture security in order to generate a prioritized list of topics.<\/li>\n<\/ul>\n<\/li>\n<li>9:45-10:05: <strong>Topics to Upstreams Mapping<\/strong>\n<ul>\n<li>Structured group activity to create a map of people, projects, and upstreams related to each of the research topics \/ areas.<\/li>\n<\/ul>\n<\/li>\n<li>10:05-10:45: <strong>Detailed technical discussions \/ next steps game planning<\/strong>\n<ul>\n<li>Planning exercise for next steps in each topic area in order to get relevant technology upstreamed for the long term.<\/li>\n<\/ul>\n<\/li>\n<li>11:00 &#8211; 12:00: <strong>Open time to address parking-lot items from first three hours.<\/strong>\n<ul>\n<li>Resolve roadmap questions, research areas.<\/li>\n<\/ul>\n<\/li>\n<li>12:00 &#8211; 1:00: <strong>Lunch<\/strong> (provided)<\/li>\n<\/ul>\n<h3>Preparing for the Roundtable<\/h3>\n<p>Before the roundtable you&#8217;ll want to:<\/p>\n<ul>\n<li>Review the background reading for the event, <a href=\"\/rhcollab\/files\/2018\/04\/Microarchitecture-Security-Research.pdf\">available here<\/a>.<\/li>\n<\/ul>\n<h3>Questions?<\/h3>\n<p><a href=\"\/rhcollab\/get-involved\/contact-us\/\">Contact the Collaboratory<\/a> with any questions you may have about this event.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dates &amp; Times Friday April 27, 2018 8:00 AM &#8211; 12:00 PM (Breakfast and lunch will be provided) Add to Calendar 04\/27\/2018 08:00 AM 04\/27\/2018 12:00 PM America\/New_York Microarchitecture Security Roundtable This roundtable aims to produce a set of research topics in the area of microarchitecture security. The 2017 Spectre and Meltdown vulnerabilities have shown [&hellip;]<\/p>\n","protected":false},"author":14350,"featured_media":0,"parent":916,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/pages\/583"}],"collection":[{"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/users\/14350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/comments?post=583"}],"version-history":[{"count":13,"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/pages\/583\/revisions"}],"predecessor-version":[{"id":591,"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/pages\/583\/revisions\/591"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/pages\/916"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/rhcollab\/wp-json\/wp\/v2\/media?parent=583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}