NOVEMBER 20th & 21st

Program Wednesday, November 20th

Session in common with C&esar conference

09:00-9:45 : Confining (Un)Trusted Execution Environments
Michael Schwarz, Graz University of Technology (Austria)


09:45-10:30 : Splitting the Linux Kernel for Fun and Profit

Chris Dalton, HP Labs (UK)

10:30-11:00 : Coffee break


11:00-11:30 : IOMMU et attaques DMA
Jean-Christophe Delaunay and Jérémie Boutoille, SYNACKTIV (France)


11:30-12:00 : Pitfalls and Limits of Dynamic Malware Analysis
Dr. Tamas K Lengyel, Intel (USA)


12:00-13:30 : Lunch 


13:30-14:00 : Insights into Software-Exploitable Hardware Bugs
Ghada Dessouky, TU Darmstadt (Germany)

14:00-14:30 : Trust Less: shrinking the trusted parts of trusted systems

Ilia Lebedev, MIT / (USA)



14:30-15:00 : Hardware and software security research at ANSSI: two case studies

Yves-Alexis Perez, ANSSI (France)

15:00-15:30 : Coffee break


15:30-17:00 : Hardware-assisted code and control flow integrity
Sylvain Guilley, Secure-IC (France)


17:00-17:30 : Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the SMM

Ronny Chevalier, HP Labs / CentraleSupélec 

Program Thursday, November 21st 

9:00-10:30 : Security in modern CPU
Guillaume Bouffard, ANSSI (France)


10:30-11:00 : Coffee break


11:00-11:30 : Hardware-Software Co-Design for Security: ECC Processor Example
Arnaud Tisserand, CNRS Lab-STICC (France)

11:30-12:00 : A case against indirect jumps for secure programs

Ronan Lashermes, Inria

12:00-13:30 : Lunch 

It is becoming increasingly important to combine software and hardware aspects in order to take into account new software attacks.

For example, hardware vulnerabilities such as Spectrum or Meltdown can be exploited by purely software attacks.

Such attacks can be executed remotely and do not require physical access to the targeted hardware platform.

It is therefore necessary to study in depth the security of software/hardware interfaces, both in terms of attacks and defences.

This issue is the subject of a thematic semester funded by the DGA and operated by Inria on behalf of all the partners in the research cluster of the "Pôle d’Excellence Cyber".


Virtualization is based on hardware features (Intel VTX, IOMMU, SGX enclave, etc.) that are used by software components, including hypervisors, to improve the performance and security of virtualized systems.

These extensions are part of the software/hardware interface and as such deserve to be studied from a security perspective.

In addition, hardware vulnerabilities, including micro-architecture, can severely impact the security of virtualized systems.

For example, they can lead to questioning the isolation between different virtual machines hosted on the same physical system or between an enclave and the host system.


Organized by Guillaume Hiet (CentraleSupélec/IRISA), Jean-Louis Lanet (Inria/IRISA) and Frédéric Tronel (CentraleSupélec/IRISA), as part of the SILM thematic semester, the workshop on the Security of Hardware Software Interfaces (SILM) will provide an opportunity to bring together various international experts related to this theme.

The first session (Wednesday morning, November 20th) of this workshop will be common to the C&ESAR conference and will focus more specifically on the security of virtualization interfaces.

The second session (Wednesday afternoon, November 20th) will address issues related to the security of software/hardware interfaces more broadly.

The last session (Thursday morning, November 21st) will be dedicated to tutorials to illustrate in a practical way the attack and defense techniques concerning this theme.

Attending this workshop is free of charge but registration is mandatory.



Supported by: