{"id":923382,"date":"2023-03-24T09:06:03","date_gmt":"2023-03-24T16:06:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&#038;p=923382"},"modified":"2025-08-01T02:43:45","modified_gmt":"2025-08-01T09:43:45","slug":"venice","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/venice\/","title":{"rendered":"Project Venice"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background- card-background--full-bleed\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"720\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720.jpg\" class=\"attachment-full size-full\" alt=\"overhead view of Venice canals and channels\" style=\"object-position: 51% 63%\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720.jpg 1920w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-300x113.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-1024x384.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-768x288.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-1536x576.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-1600x600.jpg 1600w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2023\/03\/Venice_header_1920x720-240x90.jpg 240w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 \">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h2 class=\"wp-block-heading\" id=\"project-venice\">Project Venice<\/h2>\n\n\n\n<p><\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"project-venice-principled-design-for-side-channel-protection\">Project Venice: Principled design for side-channel protection<\/h2>\n\n\n\n<p>Cloud tenants share hardware resources such as CPU cores, caches, memory, and network. A malicious tenant can observe usage patterns in those shared resources to infer information about other tenants. This has been exploited in various side-channel attacks, including Spectre-style attacks that use shared microarchitectural states to exfiltrate information illegitimately obtained during transient execution. Current countermeasures mitigate known vulnerabilities but fail to provide comprehensive guarantees.<\/p>\n\n\n\n<p>Side channels are of particular concern for confidential computing, which ensures the code and data of security-critical applications are systematically encrypted (thereby preventing direct access by other tenants or even the cloud provider) but does not preclude such information leakage.&nbsp;<\/p>\n\n\n\n<p>The goal of Project Venice is to provide strong end-to-end protection against software side-channel attacks, with confidential cloud computing as its main use case.&nbsp;To achieve this goal, we investigate novel mechanisms for the secure sharing and partitioning of compute resources, together with techniques for specifying and rigorously testing their resilience to side-channel attacks.<\/p>\n\n\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The goal of Project Venice is to provide strong end-to-end protection against software side-channel attacks, with confidential cloud computing as its main use case.<\/p>\n","protected":false},"featured_media":928122,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13556,13558],"msr-locale":[268875],"msr-impact-theme":[261676],"msr-pillar":[],"class_list":["post-923382","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-artificial-intelligence","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[254093,558288,558297,597883,660741,695898,828229,915369,969189,1087050,1087071,1144109,1145956],"related-downloads":[],"related-videos":[924399,924417],"related-groups":[559983],"related-events":[],"related-opportunities":[],"related-posts":[924321,933576,1094340],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Section name 0","alias":"fournet"},{"type":"user_nicename","display_name":"Boris K&ouml;pf","user_id":37857,"people_section":"Section name 0","alias":"bokoepf"},{"type":"user_nicename","display_name":"Oleksii Oleksenko","user_id":43146,"people_section":"Section name 0","alias":"ololeksenko"},{"type":"user_nicename","display_name":"Stavros Volos","user_id":35437,"people_section":"Section name 0","alias":"svolos"},{"type":"user_nicename","display_name":"Luca Wilke","user_id":43821,"people_section":"Section name 0","alias":"t-wilkeluca"}],"msr_research_lab":[],"msr_impact_theme":["Trust"],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":19,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382\/revisions"}],"predecessor-version":[{"id":1103709,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382\/revisions\/1103709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/928122"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=923382"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=923382"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=923382"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=923382"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=923382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}