BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.riscv-europe.org//eu-summit-2026//talk//HZQQP9
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-eu-summit-2026-HZQQP9@cfp.riscv-europe.org
DTSTART;TZID=CET:20260609T110000
DTEND;TZID=CET:20260609T111000
DESCRIPTION:While hardware prefetchers accelerate memory performance\, they
  inadvertently leave microarchitectural footprints that attackers can expl
 oit. Previous work showed that instruction and data prefetchers on Intel\,
  AMD and Apple processors are prone to microarchitectural side-channel att
 acks. In this paper we investigate the data stride prefetcher in the \\tex
 tit{Xuantie C910} -- a server-grade RISC-V processor extensively deployed 
 in cloud environments. Furthermore\, we present the first microarchitectur
 al attack targeting a hardware prefetcher on a RISC-V processors. In that 
 regard\, we port StrideRE on RISC-V processors to reverse engineer its har
 dware prefetcher. Finally\, we provide two Proof-of-Concept (PoC) attacks:
  partial memory address disclosure and control flow leakage. We find that 
 both attacks are effective across privilege levels.
DTSTAMP:20260522T163158Z
LOCATION:Poster Island A
SUMMARY:RISCY Prefetchers - Mohamed Soliman
URL:https://cfp.riscv-europe.org/eu-summit-2026/talk/HZQQP9/
END:VEVENT
END:VCALENDAR
