{"id":923382,"date":"2023-03-24T09:06:03","date_gmt":"2023-03-24T16:06:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=923382"},"modified":"2024-10-16T12:58:56","modified_gmt":"2024-10-16T19:58:56","slug":"venice","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/venice\/","title":{"rendered":"Project Venice"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\"overhead\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Project Venice<\/h2>\n\n\n\n

<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

Project Venice: Principled design for side-channel protection<\/h2>\n\n\n\n

Cloud tenants share hardware resources such as CPU cores, caches, memory, and network. A malicious tenant can observe usage patterns in those shared resources to infer information about other tenants. This has been exploited in various side-channel attacks, including Spectre-style attacks that use shared microarchitectural states to exfiltrate information illegitimately obtained during transient execution. Current countermeasures mitigate known vulnerabilities but fail to provide comprehensive guarantees.<\/p>\n\n\n\n

Side channels are of particular concern for confidential computing, which ensures the code and data of security-critical applications are systematically encrypted (thereby preventing direct access by other tenants or even the cloud provider) but does not preclude such information leakage. <\/p>\n\n\n\n

The goal of Project Venice is to provide strong end-to-end protection against software side-channel attacks, with confidential cloud computing as its main use case. To achieve this goal, we investigate novel mechanisms for the secure sharing and partitioning of compute resources, together with techniques for specifying and rigorously testing their resilience to side-channel attacks.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"

The goal of Project Venice is to provide strong end-to-end protection against software side-channel attacks, with confidential cloud computing as its main use case.<\/p>\n","protected":false},"featured_media":928122,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13556,13558],"msr-locale":[268875],"msr-impact-theme":[261676],"msr-pillar":[],"class_list":["post-923382","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-artificial-intelligence","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[1087071,254093,558288,558297,597883,660741,695898,828229,915369,969189,1087050],"related-downloads":[924138],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Section name 0","alias":"fournet"},{"type":"user_nicename","display_name":"Boris Köpf","user_id":37857,"people_section":"Section name 0","alias":"bokoepf"},{"type":"user_nicename","display_name":"Oleksii Oleksenko","user_id":43146,"people_section":"Section name 0","alias":"ololeksenko"},{"type":"user_nicename","display_name":"Stavros Volos","user_id":35437,"people_section":"Section name 0","alias":"svolos"}],"msr_research_lab":[],"msr_impact_theme":["Trust"],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":15,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382\/revisions"}],"predecessor-version":[{"id":1094490,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/923382\/revisions\/1094490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/928122"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=923382"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=923382"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=923382"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=923382"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=923382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}