SILM 2021

Welcome to the 3rd edition of our workshop on the Security of Software / Hardware Interfaces. SILM 2021 will be co-located with the 6th IEEE European Symposium on Security and Privacy (EuroS&P 2021) and will be an all-digital event.

Access Information

The SILM workshop will be held by Zoom. Join us in room D:

Do not hesitate to join our dedicated channel on Slack (#workshop_silm)

The password to access the rooms as well as the invitation to join the Slack workspace has been sent out to all registered participants (new registrations as of Sept 01 will find the virtual access data in their registration confirmation email).

If you have any questions regarding the registration process, please contact the IEEE Euro S&P organizers.

Last updates

08 2021: The program is now online!
08 2021: Do not forget to register to attend SILM sessions.

Aim and Scope

It is becoming increasingly important to combine software and hardware aspects in order to take into account new software attacks. For example, hardware vulnerabilities such as Spectre or Meltdown can be exploited by purely
software attacks. Such attacks can be executed remotely and do not require physical access to the targeted hardware platform. On the other hand, hardware features can be used to better detect and respond to traditional software attacks, such as memory corruption. It is therefore necessary to study in depth the security of software/hardware interfaces, both in terms of attacks and defenses.

The purpose of the SILM workshop is to share experiences, tools, and methodologies to handle security in software/hardware interfaces. On one hand, we need to better assess the security guarantees provided by existing hardware architectures against software attacks, especially attacks against micro-architecture. This can be achieved by identifying new vulnerabilities using reverse engineering, fuzzing, or other attack approaches. On the other hand, we also need to propose new architectures offering better resilience against software attacks. Theses architectures should rely on hardware-based security mechanisms to protect the software stack. One of the challenges is to formally specify and verify the security guarantees offered by such architectures.

The goal of this second edition of the SILM workshop is to provide a forum for researchers and practitioners from academia, industry, and government that work on the security of software/hardware interfaces.

Comments are closed.