BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//X9TXT3
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-DG7VSX@program.why2025.org
DTSTART;TZID=CET:20250811T200000
DTEND;TZID=CET:20250811T205000
DESCRIPTION:Transient execution CPU vulnerabilities\, like Spectre\, have b
 een making headlines since 2018. However\, their most common critique is t
 hat these types of vulnerabilities are not really practical. Even though i
 t is cool to leak `/etc/shadow` with a CPU bug\, it has limited real-world
  impact. In this talk\, we take Spectre out for a walk and let it see the 
 clouds\, by leaking memory across virtual machine boundaries at a public c
 loud provider\, bypassing mitigations against these types of attacks.
DTSTAMP:20250731T184530Z
LOCATION:Andromeda
SUMMARY:Spectre in the real world: Leaking your private data from the cloud
  with CPU vulnerabilities - Thijs
URL:https://program.why2025.org/why2025/talk/DG7VSX/
END:VEVENT
END:VCALENDAR
