Главная
Study mode:
on
1
Start
2
Cryptography
3
VoIP
4
Acoustic Crypt Analysis
5
SideChannel Attacks
6
New Attack
7
lynx
8
Input distinguishing attack
9
How it works
10
Background
11
Flush Plus Reload
12
Cross User Account Key Logger
13
Calculator Spy
14
Demo
15
How to use Flush Reload
16
Where to put the light bulbs
17
WhatScarlett sees
18
Experiments
19
Demonstration
20
Question Answer
Description:
Explore the world of side-channel attacks in this 24-minute Black Hat conference talk. Delve into the FLUSH+RELOAD L3 cache side-channel discovered by Yuval Yarom and Katrina Falkner in 2013, and its implications beyond cryptography. Learn how this technique can be applied to leak information from everyday applications like text editors and web browsers. Discover how to implement input distinguishing attacks, with a specific demonstration on spying user activity on Wikipedia pages. Gain insights into the attack's mechanics, its potential applications, and the speaker's goal to broaden the community's perspective on side-channel attacks. Access code to reproduce the attack and understand its real-world implications. Cover topics including VoIP, acoustic cryptanalysis, cross-user account key logging, and practical demonstrations of the technique.

Side-Channel Attacks on Everyday Applications

Black Hat
Add to list