MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481)

Authors Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice and all authors of the abstracts in this report

Thumbnail PDF


  • Filesize: 2.23 MB
  • 16 pages

Document Identifiers

Author Details

Christopher W. Fletcher
  • University of Illinois - Urbana-Champaign, US
Marco Guarnieri
  • IMDEA Software Institute - Madrid, ES
David Kohlbrenner
  • University of Washington - Seattle, US
Clémentine Maurice
  • CNRS - CRIStAL, Lille, FR
and all authors of the abstracts in this report

Cite AsGet BibTex

Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, and Clémentine Maurice. MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). In Dagstuhl Reports, Volume 13, Issue 11, pp. 151-166, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)


Microarchitectural attacks subvert the security assumptions many software-level security mechanisms rely upon, thereby threatening the security of our IT systems. These attacks exploit the side-effects (like subtle timing differences in a program’s execution time) resulting from a processor’s internal optimizations to leak sensitive information and compromise a system’s security. Building systems that are resistant against such attacks requires fundamentally rethinking the design of hardware and software security mechanisms. This seminar gathered together leading researchers that are working on security at the hardware-software interface spanning four different communities: computer security, computer architectures, programming languages and verification, and applied cryptography. The goals were to (1) present a comprehensive overview of current advances in microarchitectural attacks and defenses, (2) foster interaction and future collaboration between researchers from different research communities, and (3) identify interesting research directions and open challenges that need to be addressed to build the next generation of systems that are resistant to microarchitectural attacks.

Subject Classification

ACM Subject Classification
  • Security and privacy → Formal security models
  • Security and privacy → Security in hardware
  • Security and privacy → Systems security
  • hardware-software co-design for security
  • microarchitectural attacks
  • security architectures
  • side-channel analysis


  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    PDF Downloads
Questions / Remarks / Feedback

Feedback for Dagstuhl Publishing

Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail