Dean — Ivan Arzhantsev
First Deputy Dean— Tamara Voznesenskaya
Deputy Dean for Research and International Relations - Sergei Obiedkov
Deputy Dean for finance and administration - Irina Plisetskaya
Phone: +7 (495) 772-95-90 * 12332
Moscow, 3 Kochnovsky Proezd (near metro station 'Aeroport').
The faculty trains developers and researchers. The programme has been created based on the experience of leading American and European universities, such as Stanford University (U.S.) and EPFL (Switzerland). Also taken into consideration when creating the faculty was the School of Data Analysis, which is one of the strongest postgraduate schools in the field of computer science in Russia. The wide range of elective courses will allow each student to create his or her own educational path. In the faculty, learning is based on practice and projects.
Osokin A., Chessel A., Carazo Salas R. E. et al.
In bk.: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017). Venice: IEEE, 2017. P. 2252-2261.
Vsevolod L. Chernyshev, Tolchennikov A. A.
Regular and Chaotic Dynamics. 2017. Vol. 22. No. 8. P. 937-948.
Vereshchagin N., Kaced T., Romashchenko A.
IEEE Transactions on Information Theory. 2018. No. 99. P. 1-8.
Nesterov Y., Shikhman V.
European Journal of Operational Research. 2018. P. 1-10.
Decrouez G. G., Grabchak M., Paris Q.
Bernoulli: a journal of mathematical statistics and probability. 2018. Vol. 24. No. 3. P. 1910-1941.
Laboratory of Theoretical Computer Science: Research Fellow
Modern CPU hardware implement a memory-protection mechanism to prevent one process from reading memory of another process. A few months ago, several vulnerabilities in this mechanism were published; this talk explains one of them, called Meltdown. This attack allows one process to read the whole memory of the machine on which it currently runs. This mostly concerns cloud-computing providers, as virtual machines running on the same physical server can spy each other.
Meltdown received vast coverage because it impacts virtually any Intel CPU currently on the market, and because it has existed for about 20 years before it was discovered. Operating systems vendors have implemented, in software, techniques to mitigate Meltdown; they claim that those security patches induce performance loss in running applications.
In this talk, we will review some features of modern CPUs, then we will explain how to exploit them to bypass memory protection. Finally, we will see how operating systems were modified to mitigate this risk.
Registration is open.