National Academies Press: OpenBook
« Previous: Appendixes
Suggested Citation:"Appendix A: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2019. Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25418.
×

A Workshop Agenda

WORKSHOP ON BEYOND SPECTRE: CONFRONTING NEW TECHNICAL AND POLICY CHALLENGES

October 3, 2018
Keck Center of the National Academies of Sciences, Engineering, and Medicine
Washington, D.C
.

8:30 a.m. Welcome and Context-Setting—Fred Schneider, Chair, Forum on Cyber Resilience
9:00 Keynote—Paul Kocher, Forum Member
10:00 Break
10:30 Hardware and Software Engineering Assumptions at Risk
Session Goal: Explore future chip design and performance trade-offs with security, implications of decreasing performance, effects on software engineering and compiler design assumptions, possible responses to Spectre, and similar vulnerabilities.
Moderator: John Manferdelli, Forum Member
Ernie Brickell, Independent Security Researcher
Galen Hunt, Microsoft Research
Andrew Myers, Cornell University
12:15 p.m. Lunch
1:15 Implications for Cloud Services and Isolation
Session Goal: Explore challenges of current cloud architecture and isolation assumptions post-Spectre; importance of hardware isolation capabilities on shared
Suggested Citation:"Appendix A: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2019. Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25418.
×
infrastructure; practical implications of emerging side-channel risks and comparisons/trade-offs with other known vulnerabilities.
Moderator: Eric Grosse, Forum Member
Brandon Baker, Google
Mark Ryland, Amazon Web Services
2:30 Break
3:00 International Implications, National Security, and Vulnerability Disclosure
Session Goal: Explore complicated global landscape regarding vulnerability disclosure—how, when, who, why; examine complex space of trade-offs; provide rich picture of future challenges.
Moderator: Steven Lipner, Forum Member
Ari Schwartz, Center for Cybersecurity Policy and Law, Venable LLP
Katie Moussouris, Luta Security
Audrey L. Plonk, Intel Corporation
Paul Waller, U.K. National Cyber Security Centre
4:45 Plenary Wrap-up and Q&A
Moderator: Fred Schneider, Forum Chair

Please note: Affiliations are for identification purposes only; unless noted, speakers are speaking for themselves and not for any institutions with which they may be affiliated.

Suggested Citation:"Appendix A: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2019. Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25418.
×
Page 61
Suggested Citation:"Appendix A: Workshop Agenda." National Academies of Sciences, Engineering, and Medicine. 2019. Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop. Washington, DC: The National Academies Press. doi: 10.17226/25418.
×
Page 62
Next: Appendix B: Planning Committee Biographies »
Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop Get This Book
×
 Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop
Buy Ebook | $14.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In 2017, researchers discovered a vulnerability in microprocessors used in computers and devices all over the world. The vulnerability, named Spectre, combines side effects from caching and speculative execution, which are techniques that have been used for many years to increase the speed at which computers operate. The discovery upends a number of common assumptions about cybersecurity and draws attention to the complexities of the global supply chain and global customer base for the vast range of devices and cloud capabilities that all computer users rely on. In October 2018, the Forum on Cyber Resilience hosted a workshop to explore the implications of this development. This publication summarizes the presentations and discussions from the workshop.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!