🦞🌯 Lobster Roll

Thread

New hardware-agnostic side-channel attack works against Windows and Linux (zdnet.com)

Stories related to "New hardware-agnostic side-channel attack works against Windows and Linux" across the full archive.

New hardware-agnostic side-channel attack works against Windows and Linux (zdnet.com)
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks On PCs (tau.ac.il)
GPUs are vulnerable to side-channel attacks (networkworld.com)
Power trace simulator using Unicorn Engine for side channel analysis attack testing (github.com)
Using TensorFlow / ML for automated RF side-channel attack classification (leveldown.de)
NetCAT — network-based cache side-channel attacks on Intel DDIO (vusec.net)
A Side Journey to Titan: Side-Channel Attack on the Google Titan Security Key (ninjalab.io)
New side-channel attack can recover encryption keys from hardware security keys (zdnet.com)
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks (usenix.org)
The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) tech...
AVX Timing Side-Channel Attacks against Address Space Layout Randomization (arxiv.org)
Cross-VM side-channel attacks (blog.cryptographyengineering.com)
Practical Timing Side Channel Attacks Against Kernel Space ASLR (syssec.rub.de)
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack (eprint.iacr.org)
Reading privileged memory with a side-channel (googleprojectzero.blogspot.com)
Cache Speculation Side-channels (armkeil.blob.core.windows.net)
Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware (2016) (eprint.iacr.org)
Robust and Efficient Elimination of Cache and Timing, Side Channels (2015) (arxiv.org)
Authors claim to eliminate the side channels with a low-overhead technique that works across many languages. Their experiments apply it to C, C++, and Java programs.
Ledger hardware cryptocurrency wallets vulnerable to man-in-the-middle attack (hackread.com)
BranchScope: A New Side-Channel Attack on Directional Branch Predictor (cs.ucr.edu)
Side-channel attacking browsers through CSS3 features (evonide.com)
Side-channel attacking browsers through CSS3 features (evonide.com)
Researchers Detail New CPU Side-Channel Attack Named SpectreRSB (bleepingcomputer.com)
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers (s3.eurecom.fr)
Abstract: "This paper presents a new side channel that affects mixed-signal chips used in widespread wireless communication protocols, such as Bluetooth and WiFi. This increasingly common type of chip includes the radio transceiver along with digital logic on the same integrated circuit. In such sy...
Spectre: Secrets, Side-Channels, Sandboxes, and Security (youtube.com)
Multiple Timing Side-Channel Attacks in Cryptocat (github.com)
How many Cryptocat vulns have there been over the years? This one seems especially embarrassing...
Attack Directories, Not Caches: Side-Channel Attacks in a Non-Inclusive World (iacoma.cs.uiuc.edu)
Rendered Insecure: GPU Side Channel A!acks are Practical (cs.ucr.edu)
Abstract: "Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive wo...
Spectre is here to stay: An analysis of side-channels and speculative execution (arxiv.org)
Ledger's Advanced Side Channel Analysis Repository (github.com)
Privacy attacks to the 4G and 5G cellular paging protocols using side channel information (documentcloud.org)