µASC Conference

54 Followers
90 Following
17 Posts

Official account of the Microarchitecture Security Conference (µASC).
Cutting-edge research on #security in #microarchitecture contexts.

Next Conference: February 3, 2026, in Leuven, Belgium.

Websitehttps://uasc.cc

Missed our conference this year?

No problem! All uASC'26 paper presentations and talks are available on Youtube. 🥳

https://www.youtube.com/@uasc-conf

Microarchitecture Security Conference (uASC)

The annual uASC conference serves as a premier forum for advancing our understanding of the security of microarchitectures. Each year, uASC brings together international experts from academia and industry, to present and discuss novel research in this area.

YouTube

We're so excited to announce that Dries Vanspauwen, @lesly & Jo Van Bulck received the uASC best paper award for the paper "WeMu: Effective and Scalable Emulation of Microarchitectural Weird Machines"! Congratulations! 🎉

Check it out here: https://uasc.cc/proceedings26/uasc26-vanspauwen.pdf

#uasc26 #microarchitecture #security #conference

The 2nd Microarchitecture Security Conference in full swing. Thank you for joining us today at KU Leuven!

Coming up: Poster session & the social event afterwards!

⚠️ uASC'26 registration will close soon! ⚠️

Registration is free of charge, but mandatory for attendance. Now's your last chance! 👉 https://uasc.cc/

Our conference is held on Tuesday, February 3, 2026, in Leuven, Belgium. See you there! :)

You have less than two weeks left to submit your paper for the final submission cycle at uASC 2026!

📅 Submission Deadline: November 4, 2025
👉 https://www.uasc.cc

#microarchitecture #security #conference #uasc26

uASC 2026 will take place on February 3, 2026, in Leuven, Belgium, hosted by KU Leuven. Have you submitted your paper yet? 🤔

Cycle 2 Paper Submission Deadline is November 4, 2025!
👉 https://uasc.cc #uasc26

Congratulations to Dries Vanspauwen, Lesly-Ann Daniel & Jo Van Bulck for their paper "WeMu: Effective and Scalable Emulation of Microarchitectural Weird Machines" accepted to uASC 2026!

This paper is about emulating microarchitectural weird machines to enable the reverse engineer hidden microarchitectural computations enabled by such weird machines. Read the https://uasc.cc/proceedings26/uasc26-vanspauwen.pdf and/or attend uASC in Leuven to learn more.

Congratulations to Lukas Gerlach, Niklas Flentje & Michael Schwarz for their paper "Zero-Store Elimination and its Implications on the SIKE Cryptosystem" accepted to uASC 2026!

This paper is about the conditions under which Intel CPUs perform zero-store elimination along with an attack using this primitive on SIKE. Read the https://uasc.cc/proceedings26/uasc26-gerlach.pdf and/or attend uASC in Leuven to learn more.

Congratulations to Antoine Plin, Lorenzo Casalino, Thomas Rokicki & Ruben Salvador for their paper "Knock-Knock: Black-Box, Platform-Agnostic DRAM Address-Mapping Reverse Engineering" accepted to uASC 2026!

This paper is about formal modeling of the DRAM function reverse engineering problem and an efficient platform-agnostic algorithm for solving this probem. Read the https://uasc.cc/proceedings26/uasc26-plin.pdf and/or attend uASC in Leuven to learn more.

Congratulations to Federico Cerutti, Alvise de Faveri Tron & Cristiano Giuffrida for their paper "MicroSpark: Testing Voltage Glitches on Intel Microcode" accepted to uASC 2026!

This paper is about fault injection on real Intel CPUs, resulting in interesting primitives such as instruction skip. Read the https://uasc.cc/proceedings26/uasc26-cerutti.pdf and/or attend uASC in Leuven to learn more.