Security of Software & Hardware Interfaces (SILM)
Event submitted on Thursday, July 8th 2021, approved by Charles Villanueva ✓
This event has been tagged as follows:
The SILM workshop’s goal is to share knowledge, tools, and techniques for dealing with security in software/hardware interfaces. On the one hand, we need to evaluate the security assurances given by present hardware architectures against software assaults, particularly micro-architecture attacks. This can be done by employing reverse engineering, fuzzing, or other attack methods to find new vulnerabilities. On the other side, we must suggest new designs that are more resistant to software assaults. To secure the software stack, these designs should rely on hardware-based security measures. Formally specifying and verifying the security assurances provided by such systems is one of the problems.
Conference Event Summary
The following description was either submitted by the Conference Organizer on Thursday, July 8th 2021, or created by us.
Welcome to the 3rd edition of our workshop on the Security of Software / Hardware Interfaces. SILM 2021 will be co-located with the 6th IEEE European Symposium on Security and Privacy (EuroS&P 2021) and will be an all-digital event.
It is becoming increasingly important to combine software and hardware aspects in order to take into account new software attacks. For example, hardware vulnerabilities such as Spectre or Meltdown can be exploited by purely software attacks. Such attacks can be executed remotely and do not require physical access to the targeted hardware platform. On the other hand, hardware features can be used to better detect and respond to traditional software attacks, such as memory corruption. It is, therefore, necessary to study in-depth the security of software/hardware interfaces, both in terms of attacks and defenses.
The purpose of the SILM workshop is to share experiences, tools, and methodologies to handle security in software/hardware interfaces. On one hand, we need to better assess the security guarantees provided by existing hardware architectures against software attacks, especially attacks against micro-architecture. This can be achieved by identifying new vulnerabilities using reverse engineering, fuzzing, or other attack approaches. On the other hand, we also need to propose new architectures offering better resilience against software attacks. These architectures should rely on hardware-based security mechanisms to protect the software stack. One of the challenges is to formally specify and verify the security guarantees offered by such architectures.
The goal of this second edition of the SILM workshop is to provide a forum for researchers and practitioners from academia, industry, and government that work on the security of software/hardware interfaces.