Главная
Study mode:
on
1
Introduction
2
Timing Faults
3
Challenges
4
MDG File
5
Signature Verification
6
Code Emulation
7
Faulting Implementation
8
Faulting Sketch
9
Timing Anchor
10
Track Fault
11
Scatter Plot
12
Adaptive Delay
13
Summary
14
Remarks
15
Roundup
16
Disclosures
17
Intel SGX
18
RSA Attack
19
Why is it not random
Description:
Explore a groundbreaking 54-minute Black Hat conference talk that unveils the CLKSCREW attack, a novel class of software-based fault attacks exploiting security-oblivious energy management mechanisms. Delve into how these attacks can be conducted without physical access to devices or fault injection equipment, making them more accessible to potential attackers. Learn about timing faults, challenges in implementation, and the use of MDG files and signature verification in the attack process. Examine code emulation techniques, faulting implementations, and timing anchors used to execute the attack. Analyze scatter plots and adaptive delay methods employed to refine the attack's effectiveness. Gain insights into the implications for Intel SGX and RSA encryption, and understand why these vulnerabilities are not random occurrences. Presented by Adrian Tang, Simha Sethumadhavan, and Salvatore Stolfo, this talk offers a comprehensive look at the perils of security-oblivious energy management in modern computing systems. Read more

CLKscrew - Exposing the Perils of Security-Oblivious Energy Management

Black Hat
Add to list
0:00 / 0:00