Главная
Study mode:
on
1
Intro
2
Cache Side Channel Attacks
3
Who am I
4
Scope
5
Why is this interesting
6
How the data cache works
7
Summary
8
How is memory stored
9
Example code
10
How it works
11
Cash attacks
12
Victim time
13
Prime and Probe
14
Flush Load
15
Eject In Time
16
Shared Memory
17
Side Channel Attacks
18
Detecting Side Channels
19
Performance Counters
20
Flush Reload
21
Detecting cache misses
22
Analyzing the original code
23
Is the form scan useless
24
Flush and flush
25
Detecting flush
26
Twostage detection
27
Problems
28
Mitigation
29
Questions
Description:
Explore the intricacies of cache side channel attacks and their implications for CPU security in this 54-minute conference talk from the Hack In The Box Security Conference. Delve into how modern computer microarchitecture, particularly the cache subsystem, can be exploited to breach trust boundaries and access private data. Examine the resurgence of cache side channel attacks due to shared caches and cloud computing, and understand why software defenses are challenging yet often the only viable solution. Learn about real-world attack scenarios, including exfiltration of cryptographic keys and spying on user input. Gain insights from Anders Fogh, an experienced engineer and malware expert, as he discusses the mechanics of these attacks, detection methods using performance counters, and potential mitigation strategies.

Cache Side Channel Attacks - CPU Design As A Security Problem

Hack In The Box Security Conference
Add to list
0:00 / 0:00