• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Contacts

Dean — Ivan Arzhantsev

 

First Deputy Dean— Tamara Voznesenskaya

 

Deputy Dean for Research and International Relations - Sergei Obiedkov

 

Deputy Dean for finance and administration - Irina Plisetskaya

 

Dean's office
 

Phone: +7 (495) 772-95-90 * 12332

computerscience@hse.ru

Moscow, 3 Kochnovsky Proezd (near metro station 'Aeroport'). 

Book chapter
GANs for Biological Image Synthesis

Osokin A., Chessel A., Carazo Salas R. E. et al.

In bk.: Proceedings of the IEEE International Conference on Computer Vision (ICCV 2017). Venice: IEEE, 2017. P. 2252-2261.

Article
The Second Term in the Asymptotics for the Number of Points Moving Along a Metric Graph

Vsevolod L. Chernyshev, Tolchennikov A. A.

Regular and Chaotic Dynamics. 2017. Vol. 22. No. 8. P. 937-948.

Article
A Conditional Information Inequality and its Combinatorial Applications

Vereshchagin N., Kaced T., Romashchenko A.

IEEE Transactions on Information Theory. 2018. No. 99. P. 1-8.

Article
Dual subgradient method with averaging for optimal resource allocation
In print

Nesterov Y., Shikhman V.

European Journal of Operational Research. 2018. P. 1-10.

Article
Finite sample properties of the mean occupancy counts and probabilities
In print

Decrouez G. G., Grabchak M., Paris Q.

Bernoulli: a journal of mathematical statistics and probability. 2018. Vol. 24. No. 3. P. 1910-1941.

Colloquium: The Meltdown Attack. Speaker: Guilhem Gamard, HSE

Event ended

April 17, 18:10 – 19:30
Kochnovskii proezd, 3, room 205

Guilhem Gamard

Laboratory of Theoretical Computer Science: Research Fellow

The Meltdown Attack

Modern CPU hardware implement a memory-protection mechanism to prevent one process from reading memory of another process. A few months ago, several vulnerabilities in this mechanism were published; this talk explains one of them, called Meltdown. This attack allows one process to read the whole memory of the machine on which it currently runs. This mostly concerns cloud-computing providers, as virtual machines running on the same physical server can spy each other.

Meltdown received vast coverage because it impacts virtually any Intel CPU currently on the market, and because it has existed for about 20 years before it was discovered. Operating systems vendors have implemented, in software, techniques to mitigate Meltdown; they claim that those security patches induce performance loss in running applications.

In this talk, we will review some features of modern CPUs, then we will explain how to exploit them to bypass memory protection. Finally, we will see how operating systems were modified to mitigate this risk.

Colloquium

Registration is open. 

Registration