{"id":924417,"date":"2023-03-02T11:02:10","date_gmt":"2023-03-02T19:02:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-video&#038;p=924417"},"modified":"2023-03-02T11:04:43","modified_gmt":"2023-03-02T19:04:43","slug":"asplos22-session-2b-revizor-testing-black-box-cpus-against-speculation-contracts","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/asplos22-session-2b-revizor-testing-black-box-cpus-against-speculation-contracts\/","title":{"rendered":"ASPLOS&#8217;22 &#8211; Session 2B | Revizor: Testing Black-box CPUs against Speculation Contracts"},"content":{"rendered":"<p>ASPLOS&#8217;22: The 27th International Conference on Architectural Support for Programming Languages and Operating Systems<\/p>\n<p>Session 2B: Privacy and Software Security<br \/>\nSession Chair: Baris Kasikci, University of Michigan<\/p>\n<p>Title: Revizor: Testing Black-box CPUs against Speculation Contracts<br \/>\nPresented by: Oleksii Oleksenko (TU Dresden)<br \/>\nAuthors: Oleksii Oleksenko (TU Dresden), Christof Fetzer (TU Dresden), Boris K\u00f6pf (Microsoft Research), Mark Silberstein (Technion)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ASPLOS&#8217;22: The 27th International Conference on Architectural Support for Programming Languages and Operating Systems Session 2B: Privacy and Software Security Session Chair: Baris Kasikci, University of Michigan Title: Revizor: Testing Black-box CPUs against Speculation Contracts Presented by: Oleksii Oleksenko (TU Dresden) Authors: Oleksii Oleksenko (TU Dresden), Christof Fetzer (TU Dresden), Boris K\u00f6pf (Microsoft Research), Mark [&hellip;]<\/p>\n","protected":false},"featured_media":924420,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"research-area":[13556,13558],"msr-video-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-session-type":[],"msr-impact-theme":[],"msr-pillar":[],"msr-episode":[],"msr-research-theme":[],"class_list":["post-924417","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-research-area-artificial-intelligence","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/qz4OK0LMVk8","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/924417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/924417\/revisions"}],"predecessor-version":[{"id":924426,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/924417\/revisions\/924426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/924420"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=924417"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=924417"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=924417"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=924417"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=924417"},{"taxonomy":"msr-session-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-session-type?post=924417"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=924417"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=924417"},{"taxonomy":"msr-episode","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-episode?post=924417"},{"taxonomy":"msr-research-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-theme?post=924417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}