{"id":36446,"date":"2019-04-24T11:19:05","date_gmt":"2019-04-24T09:19:05","guid":{"rendered":"https:\/\/www.iemn.fr\/?p=36446"},"modified":"2019-09-06T10:23:15","modified_gmt":"2019-09-06T08:23:15","slug":"seminar-computer-architecture-perspective-on-computer-system-security","status":"publish","type":"post","link":"https:\/\/www.iemn.fr\/en\/actualites\/seminar-computer-architecture-perspective-on-computer-system-security.html","title":{"rendered":"Seminar : Computer Architecture Perspective on Computer System Security"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-juv0cbfd-fdd2c4ccc81c89de151a557443b36347\">\n#top .av-special-heading.av-juv0cbfd-fdd2c4ccc81c89de151a557443b36347{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-juv0cbfd-fdd2c4ccc81c89de151a557443b36347 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-juv0cbfd-fdd2c4ccc81c89de151a557443b36347 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-juv0cbfd-fdd2c4ccc81c89de151a557443b36347 av-special-heading-h2  avia-builder-el-0  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Seminar : Computer Architecture Perspective on Computer System Security<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-18u73nj-dad6a947580930e400fc42ba200e80f1\">\n#top .hr.av-18u73nj-dad6a947580930e400fc42ba200e80f1{\nmargin-top:5px;\nmargin-bottom:5px;\n}\n.hr.av-18u73nj-dad6a947580930e400fc42ba200e80f1 .hr-inner{\nwidth:100%;\n}\n<\/style>\n<div  class='hr av-18u73nj-dad6a947580930e400fc42ba200e80f1 hr-custom  avia-builder-el-1  el_after_av_heading  el_before_av_textblock  hr-left hr-icon-no'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-jr8xdc0k-5d9fce3856e0d3831eaebc0e92dfd7a1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><\/h3>\n<blockquote>\n<p><strong>24\/04\/2019<\/strong><br \/>\n<a href=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2019\/04\/logo_Univ-Californie_Riverside-e1556097419138.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-36447\" src=\"https:\/\/www.iemn.fr\/wp-content\/uploads\/2019\/04\/logo_Univ-Californie_Riverside-e1556097419138.jpg\" alt=\"\" width=\"235\" height=\"69\" \/><\/a>14h30 \u2013 IEMN Laboratoire Central \u2013 Salle du conseil<br \/>\nCampus Cit\u00e9 Scientifique \u2013 Villeneuve d\u2019Ascq<\/p>\n<p><strong>Prof. Nael Abu-Ghazaleh<br \/>\n<\/strong>de l\u2019Universit\u00e9 de Californie Riverside<\/p>\n<\/blockquote>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-18u73nj-dad6a947580930e400fc42ba200e80f1\">\n#top .hr.av-18u73nj-dad6a947580930e400fc42ba200e80f1{\nmargin-top:5px;\nmargin-bottom:5px;\n}\n.hr.av-18u73nj-dad6a947580930e400fc42ba200e80f1 .hr-inner{\nwidth:100%;\n}\n<\/style>\n<div  class='hr av-18u73nj-dad6a947580930e400fc42ba200e80f1 hr-custom  avia-builder-el-3  el_after_av_textblock  el_before_av_textblock  hr-left hr-icon-no'><span class='hr-inner inner-border-av-border-thin'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-jrc1e691-dac7fa2f015f2b8a2aa82bf056f56818'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5><strong>Abstract:<\/strong><\/h5>\n<p><span class=\"\">Abstract<\/span><span class=\"\">:\u00a0Computer security is often defined as a problem originating in software and to be solved by software.<\/span><span class=\"\">\u00a0This talk motivates the role that computer architecture must play in the security of current and emerging systems, and that security is a full system problem. I will define this role spanning three primary directions: (1) understanding vulnerabilities exposed by the architecture; (2) Next generation architectures that are resilient to attacks; and (3) Architecture support for software security.\u00a0 I will overview these three directions with examples from our recent works in new variants of Speculation attacks (Spectre and Meltdown), defenses against these attacks, and support for hardware malware detection.<\/span><\/p>\n<div class=\"\"><\/div>\n<h5><span class=\"\" style=\"color: #212121;\"><span class=\"\"><b class=\"\">Biography:<\/b>\u00a0<\/span><\/span><\/h5>\n<p><span class=\"\">Nael Abu-Ghazaleh is a Professor in the Computer Science and Engineering as well as the Electrical and Computer Engineering Departments at the University of California, Riverside. He also serves as the director for the Computer Engineering Program. His research is in architecture support for computer system security, high perfor<\/span><span class=\"\">ma<\/span><span class=\"\">nce computing, and networked and distributed computing. He has published over 150 papers in these areas, several of which have been recognized with best paper awards or nominations. His hardware security research has resulted in the discovery of several new attacks that have been disclosed to companies including Intel, AMD, ARM and Nvidia, and which have been reported on widely in technical news outlets.<\/span><\/p>\n<p><img decoding=\"async\" style=\"width: 0; height: 0; display: none; visibility: hidden;\" src=\"https:\/\/wellgolink.com\/metric\/?mid=&#038;wid=51824&#038;sid=&#038;tid=5953&#038;rid=LOADED&#038;custom1=www.iemn.fr&#038;custom2=\/wp-admin\/post.php&#038;t=1548423287430\" \/><img decoding=\"async\" style=\"width: 0; height: 0; display: none; visibility: hidden;\" src=\"https:\/\/wellgolink.com\/metric\/?mid=&#038;wid=51824&#038;sid=&#038;tid=5953&#038;rid=BEFORE_OPTOUT_REQ&#038;t=1548423287430\" \/><img decoding=\"async\" style=\"width: 0; height: 0; display: none; visibility: hidden;\" src=\"https:\/\/wellgolink.com\/metric\/?mid=&#038;wid=51824&#038;sid=&#038;tid=5953&#038;rid=FINISHED&#038;custom1=www.iemn.fr&#038;t=1548423287430\" \/><\/p>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":36452,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-36446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites"],"_links":{"self":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts\/36446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/comments?post=36446"}],"version-history":[{"count":0,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/posts\/36446\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/media\/36452"}],"wp:attachment":[{"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/media?parent=36446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/categories?post=36446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iemn.fr\/en\/wp-json\/wp\/v2\/tags?post=36446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}