Education Research Current About VU Amsterdam NL
Login as
Prospective student Student Employee
Bachelor Master VU for Professionals
Exchange programme VU Amsterdam Summer School Honours programme VU-NT2 Semester in Amsterdam
PhD at VU Amsterdam Research highlights Prizes and distinctions
Research institutes Our scientists Research Impact Support Portal Creating impact
News Events calendar Woman at the top
Israël and Palestinian regions Culture on campus
Practical matters Mission and core values Entrepreneurship on VU Campus
Organisation Partnerships Alumni University Library Working at VU Amsterdam
Sorry! De informatie die je zoekt, is enkel beschikbaar in het Engels.
This programme is saved in My Study Choice.
Something went wrong with processing the request.
Something went wrong with processing the request.

PhD defence E. Barberis 18 March 2025 09:45 - 11:15

Share
Unveiling microarchitectural secrets: the security impact of cpu implementations

Computer scientist Enrico Barberis’ research uncovered vulnerabilities in CPU security, prompting major vendors like Intel and AMD to take immediate action to improve security.

Barberis delved into the architectural complexity of modern CPUs, with the goal of uncovering previously unknown security vulnerabilities while simultaneously exploring hidden performance optimizations. This work was driven by recent studies highlighting how the growing complexity of modern CPU designs has led to a new class of vulnerabilities. These flaws are concerning because they are deeply embedded in the hardware, making them complex to address via software patches. Therefore, understanding and mitigating these risks is crucial to ensuring the security and reliability of computer systems.

Major manufacturers take action
Barberis uncovered new security vulnerabilities affecting millions of CPUs. As a result, major manufacturers such as Intel and AMD had to improve their hardware measures to ensure better security in future processor designs. In addition, Barberis and his colleagues demonstrated a new technique to more efficiently detect security flaws in software, leading to a faster and more effective approach to improving automated software testing.

The research was conducted primarily through “reverse engineering,” which involves revealing the internal architectural details of CPUs using deductive reasoning and experimental analysis. By extracting information from these black-box CPU designs, the scientists discovered new security vulnerabilities and hidden performance optimizations. This process was based entirely on observing execution times and other measurable effects of carefully crafted programs, which were used to test and validate hypotheses about the design of specific CPU components.

Shift in approach to CPU security
The main impact of this research is that newer CPUs will be more secure, because the vulnerabilities the researchers identified have been addressed. Recent processors have already implemented specific mitigations to address these vulnerabilities. However, the impact of this work goes beyond the introduction of new mitigations. It has also led to a broader shift in the way CPU security is approached, demonstrating that such attacks are not just theoretical, but also practical and important to address.

More information on the thesis

Programme

PhD defence by E. Barberis

PhD Faculty of Science

Supervisors:

  • prof.dr.ir. H.J. Bos
  • dr. C. Giuffrida

The PhD defence can be followed online as well

About PhD defence E. Barberis

Starting date

  • 18 March 2025

Time

  • 09:45 - 11:15

Location

  • Auditorium, Main building
  • (1st floor)

Address

  • De Boelelaan 1105
  • 1081 HV Amsterdam

Follow the defence online

Go to livestream

Enrico Barberis

Enrico Barberis

Quick links

Homepage Culture on campus VU Sports Centre Dashboard

Study

Academic calendar Study guide Timetable Canvas

Featured

VUfonds VU Magazine Ad Valvas Digital accessibility

About VU

Contact us Working at VU Amsterdam Faculties Divisions
Privacy Disclaimer Veiligheid Webcolofon Cookies Webarchief

Copyright © 2025 - Vrije Universiteit Amsterdam