Главная
Study mode:
on
1
Intro
2
Last Level Cache Attacks: Feasibility Trend?
3
Why Attack LLC?
4
The Flush and Reload Attack
5
The Prime and Probe Attack
6
How to Retrieve Information?
7
Malicious Javascript Execution
8
Trusted Execution Environments
9
Malicious Smartphones Applications
10
Avoiding Collisions in the LLC
11
Key Takeaways
Description:
Explore the world of Last Level Cache (LLC) attacks in this 20-minute conference talk from USENIX Enigma 2017. Delve into the security concerns posed by cache attacks, which can compromise cryptographic keys and user privacy. Learn about the Flush and Reload and Prime and Probe techniques, their requirements, and potential targets in everyday software. Examine various attack scenarios, including IaaS and PaaS environments, Web browsing JavaScript attacks, trusted execution environments, and cross-smartphone application vulnerabilities. Evaluate the effectiveness of preventive measures at network, software, OS/hypervisor, and hardware levels to safeguard against these sophisticated threats.

LLC Cache Attacks: Applicability and Countermeasures

USENIX Enigma Conference
Add to list
0:00 / 0:00