{"id":659292,"date":"2020-05-15T14:42:41","date_gmt":"2020-05-15T21:42:41","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=659292"},"modified":"2025-08-06T11:52:52","modified_gmt":"2025-08-06T18:52:52","slug":"ieee-symposium-on-security-privacy","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/ieee-symposium-on-security-privacy\/","title":{"rendered":"IEEE Symposium on S&P"},"content":{"rendered":"\n\n<p><strong>Website:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE Symposium on S&P<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>Microsoft is proud to be a Platinum sponsor of\u00a0the\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">41st\u00a0IEEE Symposium on Security and Privacy<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. See our published papers and presentations below.<\/p>\n<h3>Program Committee Members<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/marcuspe\/\">Marcus Peinado<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/elredmil\/\">Elissa\u00a0Redmiles<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a><\/p>\n<div style=\"height: 30px\"><\/div>\n<h2>Monday, May 18<\/h2>\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Microarchitectural Security | Room 1<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/spectector-principled-detection-of-speculative-information-flows\/\"><b>Spectector: Principled Detection of Speculative Information Flows<\/b><\/a><br \/>\nMarco Guarnieri, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<\/a>,\u00a0Jos\u00e9 Morales, Jan\u00a0Reineke, Andr\u00e9s S\u00e1nchez<\/p>\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Blockchain I\u00a0| Room 2<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/replicated-state-machines-without-replicated-execution\/\"><b>Replicated State Machines Without Replicated Execution<\/b><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/jonatlee\/\">Jonathan Lee<\/a>,\u00a0Kirill\u00a0Nikitin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a><\/p>\n<h3>11:20 AM\u201312:20 PM PDT | Session #2: Machine Learning and Privacy\u00a0| Room 3<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow-secure-tensorflow-inference\/\"><b>CrypTFlow: Secure TensorFlow Inference<\/b><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/nishkum.github.io\/\">Nishant Kumar<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/mayank0403.github.io\/\">Mayank\u00a0Rathee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya\u00a0Gupta<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<\/a><\/p>\n<hr \/>\n<h2>Tuesday, May 19<\/h2>\n<h3>8:10 AM\u20139:30 AM PDT\u00a0| Session #4: Memory Safety | Room 1<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cornucopia-temporal-safety-for-cheri-heaps\/\"><b>Cornucopia: Temporal Safety for CHERI Heaps<\/b><\/a><br \/>\nNathaniel Wesley Filardo,\u00a0Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dachisna\/\">David Chisnall<\/a>,\u00a0Jessica Clarke,\u00a0Khilan\u00a0Gudka, Alexandre\u00a0Joannou, A. Theodore\u00a0Markettos, Alfredo\u00a0Mazzinghi, Robert Norton, Michael Roe, Peter Sewell, Stacey Son, Timothy M. Jones, Simon Moore, Peter G. Neumann, Robert N. M. Watson<\/p>\n<h3>10:00 AM\u201311:20 AM PDT\u00a0| Session #5:\u00a0Rowhammer\u00a0| Room 2<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/are-we-susceptible-to-rowhammer-an-end-to-end-methodology-for-cloud-providers\/\"><b>Are We Susceptible to\u00a0Rowhammer? An End-to-End Methodology for Cloud Providers<\/b><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/nl.linkedin.com\/in\/cojocar\">Lucian\u00a0Cojocar<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0Jeremie Kim, Minesh Patel, Lillian Tsai,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\">Stefan\u00a0Saroiu<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\">Alec Wolman<\/a>,\u00a0Onur Mutlu<\/p>\n<h3>12:30 PM\u20131:50 PM PDT\u00a0| Session #6: Formal Verification | Room 3<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/evercrypt-a-fast-veri%ef%ac%81ed-cross-platform-cryptographic-provider\/\"><b>EverCrypt: A Fast, Verified, Cross-Platform\u00a0Crytographic\u00a0Provider<\/b><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan\u00a0Protzenko<\/a>, Bryan\u00a0Parno, Aymeric Fromherz,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/chrishaw\/\">Chris\u00a0Hawblitzel<\/a>,\u00a0Marina\u00a0Polubelova, Karthikeyan\u00a0Bhargavan, Benjamin\u00a0Beurdouche,\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/joonwon.net\/c\/\">Joonwon\u00a0Choi<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>,\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/antoine.delignat-lavaud.fr\/\">Antione\u00a0Delignat-Lavaud<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/fournet\/\">C\u00e9dric Fournet<\/a>,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/taramana\/\">Tahina\u00a0Ramananandro<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nswamy\/\">Nikhil Swamy<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph\u00a0Wintersteiger<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-Beguelin<\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is proud to be a Platinum sponsor of\u00a0the\u00a041st\u00a0IEEE Symposium on Security and Privacy. The event will be held virtually this year on May 18-20, 2020.<\/p>\n","protected":false},"featured_media":498056,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2020-05-18","msr_enddate":"2020-05-20","msr_location":"Virtual\/Online","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":true,"msr_private_event":false,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558],"msr-region":[256048],"msr-event-type":[197941],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-659292","msr-event","type-msr-event","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-region-global","msr-event-type-conferences","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"IEEE Symposium on Su0026P\",\"backgroundColor\":\"grey\",\"image\":{\"id\":498056,\"url\":\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720.png\",\"alt\":\"\"},\"imageType\":\"full-bleed\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"About\"} --><!-- wp:freeform --><p><strong>Website:<\/strong> <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE Symposium on S&amp;P<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>Microsoft is proud to be a Platinum sponsor of\u00a0the\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">41st\u00a0IEEE Symposium on Security and Privacy<\/a>. See our published papers and presentations below.<\/p>\n<h3>Program Committee Members<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/marcuspe\/\">Marcus Peinado<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/elredmil\/\">Elissa\u00a0Redmiles<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a><\/p>\n<div style=\"height: 30px\"><\/div>\n<h2>Monday, May 18<\/h2>\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Microarchitectural Security | Room 1<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/spectector-principled-detection-of-speculative-information-flows\/\"><b>Spectector: Principled Detection of Speculative Information Flows<\/b><\/a><br \/>\nMarco Guarnieri, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<\/a>,\u00a0Jos\u00e9 Morales, Jan\u00a0Reineke, Andr\u00e9s S\u00e1nchez<\/p>\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Blockchain I\u00a0| Room 2<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/replicated-state-machines-without-replicated-execution\/\"><b>Replicated State Machines Without Replicated Execution<\/b><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/jonatlee\/\">Jonathan Lee<\/a>,\u00a0Kirill\u00a0Nikitin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a><\/p>\n<h3>11:20 AM\u201312:20 PM PDT | Session #2: Machine Learning and Privacy\u00a0| Room 3<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow-secure-tensorflow-inference\/\"><b>CrypTFlow: Secure TensorFlow Inference<\/b><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/nishkum.github.io\/\">Nishant Kumar<\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/mayank0403.github.io\/\">Mayank\u00a0Rathee<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya\u00a0Gupta<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<\/a><\/p>\n<hr \/>\n<h2>Tuesday, May 19<\/h2>\n<h3>8:10 AM\u20139:30 AM PDT\u00a0| Session #4: Memory Safety | Room 1<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cornucopia-temporal-safety-for-cheri-heaps\/\"><b>Cornucopia: Temporal Safety for CHERI Heaps<\/b><\/a><br \/>\nNathaniel Wesley Filardo,\u00a0Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dachisna\/\">David Chisnall<\/a>,\u00a0Jessica Clarke,\u00a0Khilan\u00a0Gudka, Alexandre\u00a0Joannou, A. Theodore\u00a0Markettos, Alfredo\u00a0Mazzinghi, Robert Norton, Michael Roe, Peter Sewell, Stacey Son, Timothy M. Jones, Simon Moore, Peter G. Neumann, Robert N. M. Watson<\/p>\n<h3>10:00 AM\u201311:20 AM PDT\u00a0| Session #5:\u00a0Rowhammer\u00a0| Room 2<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/are-we-susceptible-to-rowhammer-an-end-to-end-methodology-for-cloud-providers\/\"><b>Are We Susceptible to\u00a0Rowhammer? An End-to-End Methodology for Cloud Providers<\/b><\/a><br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/nl.linkedin.com\/in\/cojocar\">Lucian\u00a0Cojocar<\/a>,\u00a0Jeremie Kim, Minesh Patel, Lillian Tsai,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\">Stefan\u00a0Saroiu<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\">Alec Wolman<\/a>,\u00a0Onur Mutlu<\/p>\n<h3>12:30 PM\u20131:50 PM PDT\u00a0| Session #6: Formal Verification | Room 3<\/h3>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/evercrypt-a-fast-veri%ef%ac%81ed-cross-platform-cryptographic-provider\/\"><b>EverCrypt: A Fast, Verified, Cross-Platform\u00a0Crytographic\u00a0Provider<\/b><\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan\u00a0Protzenko<\/a>, Bryan\u00a0Parno, Aymeric Fromherz,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/chrishaw\/\">Chris\u00a0Hawblitzel<\/a>,\u00a0Marina\u00a0Polubelova, Karthikeyan\u00a0Bhargavan, Benjamin\u00a0Beurdouche,\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/joonwon.net\/c\/\">Joonwon\u00a0Choi<\/a>,\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/antoine.delignat-lavaud.fr\/\">Antione\u00a0Delignat-Lavaud<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/fournet\/\">C\u00e9dric Fournet<\/a>,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/taramana\/\">Tahina\u00a0Ramananandro<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nswamy\/\">Nikhil Swamy<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph\u00a0Wintersteiger<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-Beguelin<\/a><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"About","content":"Microsoft is proud to be a Platinum sponsor of\u00a0the\u00a0<a href=\"https:\/\/www.ieee-security.org\/TC\/SP2020\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">41st\u00a0IEEE Symposium on Security and Privacy<\/a>. See our published papers and presentations below.\r\n<h3>Program Committee Members<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/melissac\/\">Melissa Chase<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/wdcui\/\">Weidong Cui<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/marcuspe\/\">Marcus Peinado<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/elredmil\/\">Elissa\u00a0Redmiles<\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a>\r\n<div style=\"height: 30px\"><\/div>\r\n<h2>Monday, May 18<\/h2>\r\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Microarchitectural Security | Room 1<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/spectector-principled-detection-of-speculative-information-flows\/\"><b>Spectector: Principled Detection of Speculative Information Flows<\/b><\/a>\r\nMarco Guarnieri, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bokoepf\/\">Boris K\u00f6pf<\/a>,\u00a0Jos\u00e9 Morales, Jan\u00a0Reineke, Andr\u00e9s S\u00e1nchez\r\n<h3>9:30 AM\u201310:50 AM PDT | Session #1: Blockchain I\u00a0| Room 2<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/replicated-state-machines-without-replicated-execution\/\"><b>Replicated State Machines Without Replicated Execution<\/b><\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/jonatlee\/\">Jonathan Lee<\/a>,\u00a0Kirill\u00a0Nikitin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/srinath\/\">Srinath Setty<\/a>\r\n<h3>11:20 AM\u201312:20 PM PDT | Session #2: Machine Learning and Privacy\u00a0| Room 3<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cryptflow-secure-tensorflow-inference\/\"><b>CrypTFlow: Secure TensorFlow Inference<\/b><\/a>\r\n<a href=\"https:\/\/nishkum.github.io\/\">Nishant Kumar<\/a>, <a href=\"https:\/\/mayank0403.github.io\/\">Mayank\u00a0Rathee<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nichandr\/\">Nishanth Chandran<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/digup\/\">Divya\u00a0Gupta<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/rahsha\/\">Rahul Sharma<\/a>\r\n\r\n<hr \/>\r\n\r\n<h2>Tuesday, May 19<\/h2>\r\n<h3>8:10 AM\u20139:30 AM PDT\u00a0| Session #4: Memory Safety | Room 1<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/cornucopia-temporal-safety-for-cheri-heaps\/\"><b>Cornucopia: Temporal Safety for CHERI Heaps<\/b><\/a>\r\nNathaniel Wesley Filardo,\u00a0Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dachisna\/\">David Chisnall<\/a>,\u00a0Jessica Clarke,\u00a0Khilan\u00a0Gudka, Alexandre\u00a0Joannou, A. Theodore\u00a0Markettos, Alfredo\u00a0Mazzinghi, Robert Norton, Michael Roe, Peter Sewell, Stacey Son, Timothy M. Jones, Simon Moore, Peter G. Neumann, Robert N. M. Watson\r\n<h3>10:00 AM\u201311:20 AM PDT\u00a0| Session #5:\u00a0Rowhammer\u00a0| Room 2<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/are-we-susceptible-to-rowhammer-an-end-to-end-methodology-for-cloud-providers\/\"><b>Are We Susceptible to\u00a0Rowhammer? An End-to-End Methodology for Cloud Providers<\/b><\/a>\r\n<a href=\"https:\/\/nl.linkedin.com\/in\/cojocar\">Lucian\u00a0Cojocar<\/a>,\u00a0Jeremie Kim, Minesh Patel, Lillian Tsai,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\">Stefan\u00a0Saroiu<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\">Alec Wolman<\/a>,\u00a0Onur Mutlu\r\n<h3>12:30 PM\u20131:50 PM PDT\u00a0| Session #6: Formal Verification | Room 3<\/h3>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/evercrypt-a-fast-veri%ef%ac%81ed-cross-platform-cryptographic-provider\/\"><b>EverCrypt: A Fast, Verified, Cross-Platform\u00a0Crytographic\u00a0Provider<\/b><\/a>\r\n<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/protz\/\">Jonathan\u00a0Protzenko<\/a>, Bryan\u00a0Parno, Aymeric Fromherz,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/chrishaw\/\">Chris\u00a0Hawblitzel<\/a>,\u00a0Marina\u00a0Polubelova, Karthikeyan\u00a0Bhargavan, Benjamin\u00a0Beurdouche,\u00a0<a href=\"http:\/\/joonwon.net\/c\/\">Joonwon\u00a0Choi<\/a>,\u00a0<a href=\"http:\/\/antoine.delignat-lavaud.fr\/\">Antione\u00a0Delignat-Lavaud<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/fournet\/\">C\u00e9dric Fournet<\/a>,\u00a0Natalia\u00a0Kulatova,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/taramana\/\">Tahina\u00a0Ramananandro<\/a>,\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/aseemr\/\">Aseem\u00a0Rastogi<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/nswamy\/\">Nikhil Swamy<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph\u00a0Wintersteiger<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/santiago\/\">Santiago Zanella-Beguelin<\/a>"}],"msr_startdate":"2020-05-18","msr_enddate":"2020-05-20","msr_event_time":"","msr_location":"Virtual\/Online","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"May 18, 2020","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":"<img width=\"960\" height=\"360\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720.png\" class=\"img-object-cover\" alt=\"Security, Privacy &amp; Cryptography research area\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720.png 3840w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720-300x113.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720-768x288.png 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720-1024x384.png 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720-1920x720.png 1920w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2017\/03\/Area_IconHeader_Sys_Security_1920x720-1600x600.png 1600w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","event_excerpt":"Microsoft is proud to be a Platinum sponsor of\u00a0the\u00a041st\u00a0IEEE Symposium on Security and Privacy. The event will be held virtually this year on May 18-20, 2020.","msr_research_lab":[],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/659292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/659292\/revisions"}],"predecessor-version":[{"id":1146965,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/659292\/revisions\/1146965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/498056"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=659292"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=659292"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=659292"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=659292"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=659292"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=659292"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=659292"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=659292"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=659292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}