Главная
Study mode:
on
1
Intro
2
SideChannel Attacks
3
Spectre
4
Spectre Gadget
5
Speculative Load Hardening
6
Real World Example
7
Speculative Fence
8
Density Classification
9
Timing attacks
10
Techniques of avoiding timing attacks
11
Why are timing attacks still around
12
Survey results
13
Survey focus
14
Developers knowledge
15
Why timing attacks
16
Full and partial resistance
17
Random delays
18
Tools
19
Developers
20
What can we do
21
Crypto developers
22
Compilers
23
Standardization bodies
24
Conclusion
25
QA
26
Lend Me Your Ear
27
Software SideChannels
28
Physical SideChannels
29
Laptops
30
Voice Over IP
31
Website Identification Attack
Description:
Explore the world of side-channel attacks in this comprehensive lecture. Delve into various types of attacks, including Spectre and timing attacks, and understand their real-world implications. Learn about techniques to avoid timing attacks, the reasons behind their persistence, and the results of a developer knowledge survey. Discover the roles of crypto developers, compilers, and standardization bodies in addressing these security concerns. Gain insights into software and physical side-channel attacks, covering topics such as laptops, Voice Over IP, and website identification attacks. Conclude with a Q&A session to solidify your understanding of this critical cybersecurity topic.

Side-Channel Attacks

TheIACR
Add to list
0:00 / 0:00