Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Timing Attacks
YouTube
education
Showing:
42
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
TheIACR
TPM-FAIL - TPM Meetings Timing and Lattice Attacks
0
rewiews
Explore TPM vulnerabilities, timing attacks, and lattice-based cryptanalysis. Learn about ECDSA nonce issues and their impact on digital signatures in trusted computing.
Add to list
17
Lesons
34 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks
0
rewiews
Explore side-channel attacks, including Spectre, timing attacks, and countermeasures. Learn about developer knowledge, resistance techniques, and future directions in cybersecurity.
Add to list
31
Lesons
1 hour 14 minutes
On-Demand
Free-Video
Hackaday
FPGA Glitching & Side Channel Attacks
0
rewiews
Explore side channel analysis and fault injection attacks on modern systems using low-cost hardware like FPGAs. Learn about powerful techniques once reserved for governments and researchers.
Add to list
22
Lesons
31 minutes
On-Demand
Free-Video
Practical Side Channel Attacks on Modern Browsers - Lecture 6
0
rewiews
Explore practical side channel attacks on modern browsers, covering XSS filters, timing attacks, clipboard vulnerabilities, and more. Learn about login history exploits and data URI schemes.
Add to list
15
Lesons
58 minutes
On-Demand
Free-Video
OWASP Foundation
On the Insecurity of JavaScript Object Signing and Encryption - AppSec EU 2017
0
rewiews
Comprehensive analysis of JavaScript Object Signing and Encryption (JOSE) security, revealing critical vulnerabilities in popular libraries and introducing JOSEPH, an automated evaluation tool.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
OWASP Foundation
The Timing Attacks They Are A-Changin' - Web-based and Browser-based Timing Attack Techniques
0
rewiews
Explore evolving timing attacks in web security, from classic cross-site techniques to browser-based methods, and learn effective mitigation strategies.
Add to list
16
Lesons
42 minutes
On-Demand
Free-Video
OWASP Foundation
Top 10 Web Hacking Techniques of 2013 - OWASP AppSecUSA 2014
0
rewiews
Explore the top 10 innovative web hacking techniques of 2013, including Mutation XSS, BREACH, and HTML5 attacks. Learn about cutting-edge security vulnerabilities and their implications for web applications.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
Cooper
Practical and Affordable Side-Channel Attacks
0
rewiews
Explore affordable side-channel attacks with practical demonstrations, learning techniques to exploit vulnerabilities in cryptographic implementations and secure systems.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Microarchitecture - CHES 2024
0
rewiews
Explore microarchitectural side-channel attacks and defenses in cryptographic systems at CHES 2024, featuring cutting-edge research and expert insights.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
Paul G. Allen School
Building Trusted Systems on Top of Leaky Abstractions
0
rewiews
Exploring secure system design in complex tech stacks. Covers side-channel attacks, browser security, and trusted execution environments. Insights on building robust systems against known and unknown threats.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Physical Emissions - CHES 2024
0
rewiews
Explore cutting-edge research on physical emissions in cryptographic hardware at CHES 2024, chaired by Patrick Schaumont. Gain insights into latest developments and implications for secure system design.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
WEareTROOPERS
Say Hello to Your New Cache Flow
0
rewiews
Explore innovative cache flow techniques in IT security with experts Geoffrey Bertoli, Rémi Jullian, and Théo Gordyjan at TROOPERS24 conference in Heidelberg, Germany.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
IEEE
Efficient Relational Symbolic Execution for Constant-Time at Binary-Level
0
rewiews
Efficient binary-level verification tool for constant-time programming, providing bug-finding and bounded-verification through relational symbolic execution and optimizations for information flow analysis.
Add to list
16
Lesons
16 minutes
On-Demand
Free-Video
ACM SIGPLAN
Leakage Models: A Leaky Abstraction in Cryptographic Software Verification
0
rewiews
Explore gate-level verification for cryptographic software timing, abandoning leakage models. Discover a novel approach to ensure constant-time execution in hardware implementations.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
IEEE
Invisible Probe - Timing Attacks with PCIe Congestion Side-channel
0
rewiews
Explore timing attacks using PCIe congestion side-channels, including challenges, contributions, experiments, and potential mitigations in this IEEE presentation.
Add to list
7
Lesons
14 minutes
On-Demand
Free-Video
IEEE
What Cryptographic Library Developers Think About Timing Attacks
0
rewiews
Explore cryptographic library developers' perspectives on timing attacks, their mitigation strategies, and the challenges in implementing secure cryptographic systems.
Add to list
6
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Timing Attacks in Cryptographic Libraries - Developers' Perspectives
0
rewiews
Explore cryptographic library developers' perspectives on timing attacks and their mitigation strategies in this insightful conference session.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
TheIACR
Machine Learning and Side-Channel Analysis - Part 2
0
rewiews
Explore advanced machine learning techniques for side-channel analysis in cryptography, covering neural networks, deep learning, and collision attacks with practical applications and sensitivity analysis.
Add to list
20
Lesons
1 hour 21 minutes
On-Demand
Free-Video
TheIACR
Mathematical Problems Arising from Timing Attacks on Signatures and Their Countermeasures - Invited Talk 2
0
rewiews
Exploration of mathematical challenges in timing attacks on digital signatures and strategies for defense, presented by Mehdi Tibouchi at Asiacrypt 2023.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
BSidesLV
Real World Security in a Clinical Healthcare Environment - Hacking a Hospital
0
rewiews
Explore real-world healthcare security vulnerabilities, threat modeling, and IoT device risks. Learn practical strategies to protect hospital systems and patient data from cyber attacks.
Add to list
25
Lesons
53 minutes
On-Demand
Free-Video
media.ccc.de
High-Assurance Crypto Software
0
rewiews
Exploración de criptografía de alta seguridad: ataques de tiempo, software de tiempo constante y herramientas de ingeniería inversa para verificar implementaciones criptográficas.
Add to list
13
Lesons
1 hour 1 minute
On-Demand
Free-Video
DefCamp
Timing Attacks Against Web Applications: Are They Still Practical? - DefCamp - 2018
0
rewiews
Explore the practicality of timing attacks on web applications, including prerequisites, calculation methods, and potential consequences. Learn about attack resources and possible solutions.
Add to list
12
Lesons
55 minutes
On-Demand
Free-Video
WEareTROOPERS
20 Ways Past Secure Boot
0
rewiews
Explore 20 methods to bypass secure boot, including debug access, exploits, timing attacks, glitches, and design flaws. Learn about real-world examples and security implications.
Add to list
34
Lesons
52 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exploitation of a Hardened MSP430-Based Device - Braden Thomas - Ekoparty Security Conference - 2014
0
rewiews
Reverse-engineering and exploiting a hardened MSP430 device: techniques for firmware extraction, analysis, and data retrieval from RAM, with focus on overcoming JTAG security measures.
Add to list
29
Lesons
41 minutes
On-Demand
Free-Video
RSA Conference
How the Best Hackers Learn Their Craft
0
rewiews
Discover the proven system for building elite hacker teams, from talent identification to competition success. Learn surprising strategies for developing top-tier cybersecurity skills and fostering creative problem-solving abilities.
Add to list
31
Lesons
43 minutes
On-Demand
Free-Video
Black Hat
Timeless Timing Attacks
0
rewiews
Explore novel timing attacks resilient to network jitter, uncovering vulnerabilities in cryptosystems and applications. Learn about cross-site and Wi-Fi password brute-forcing techniques.
Add to list
11
Lesons
39 minutes
On-Demand
Free-Video
Kaspersky
Evading Anti-APT Technologies
0
rewiews
Learn advanced techniques to bypass anti-APT technologies, including sandbox weaknesses, timing attacks, and dynamic analysis. Gain insights into evading endpoint security and improving your cybersecurity skills.
Add to list
13
Lesons
16 minutes
On-Demand
Free-Video
Black Hat
My Ticks Don't Lie - New Timing Attacks for Hypervisor Detection
0
rewiews
Explore new timing attacks for hypervisor detection, crucial for sandbox evasion in malware analysis. Learn about hardware-assisted virtualization vulnerabilities and low-level measurement techniques.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Black Hat
Next Level Cheating and Leveling Up Mitigations
0
rewiews
Explore sophisticated attacks on anti-cheat systems in multiplayer gaming, including practical demonstrations and implications for game security and the future of cheat prevention.
Add to list
17
Lesons
47 minutes
On-Demand
Free-Video
IEEE
On Subnormal Floating Point and Abnormal Timing
0
rewiews
Explores timing vulnerabilities in x86 floating-point operations, demonstrating practical attacks on Firefox and a privacy-focused database. Introduces a constant-time math library as a potential mitigation.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Black Hat
Reverse-Engineering the Supra iBox - Exploitation of a Hardened MSP430-Based Device
0
rewiews
Detailed walkthrough of reverse-engineering and exploiting a hardened MSP430-based key storage device, covering firmware extraction, crypto analysis, and various attack techniques.
Add to list
33
Lesons
48 minutes
On-Demand
Free-Video
Black Hat
Racing Towards Practical Timing Attacks
0
rewiews
Explore practical timing attacks in web applications, focusing on detection, exploitability, and defense. Learn to distinguish theoretical vulnerabilities from real threats using the 'time trial' tool.
Add to list
17
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
AIS Exposed - Understanding Vulnerabilities and Attacks 2.0
0
rewiews
Explore vulnerabilities in Automatic Identification Systems, including malicious routes, hijacking, spoofing, and DoS attacks. Learn about real-world experiments and proposed countermeasures.
Add to list
20
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
CacheBleed - A Timing Attack on OpenSSL Constant Time RSA
0
rewiews
Explore a timing attack on OpenSSL's constant-time RSA implementation, uncovering vulnerabilities in cryptographic systems and their potential impact on security.
Add to list
9
Lesons
21 minutes
On-Demand
Free-Video
USENIX
Prefix Siphoning - Exploiting LSM-Tree Range Filters for Information Disclosure
0
rewiews
Explores key disclosure timing attacks on LSM-tree based key-value stores using range filters, demonstrating security vulnerabilities in data storage systems.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
JSConf
JavaScript - The Evil Parts
0
rewiews
Explore JavaScript's security vulnerabilities, design flaws, and potential for application hijacking. Learn about obfuscation techniques and enterprise-level attacks in this eye-opening talk.
Add to list
28
Lesons
1 hour
On-Demand
Free-Video
DEFCONConference
Clocks Have Ears - Timing and Browser-Based Local Network Port Scanner
0
rewiews
Discover how browser-based timing attacks can be used for local network port scanning, exploring innovative security techniques and network vulnerability assessment methods.
Add to list
1
Lesons
18 minutes
On-Demand
Free-Video
TheIACR
Side Channels and Leakage in Cryptography
0
rewiews
Explore cutting-edge research on cryptographic vulnerabilities and protection mechanisms in this expert-led session from a prestigious conference.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
TheIACR
Side Channels and Backdoors in Cryptographic Systems
0
rewiews
Explore side channels, backdoors, and security vulnerabilities in various systems. Learn about mitigations, lessons from past failures, and best practices for secure key generation and boot processes.
Add to list
19
Lesons
1 hour 4 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Analysis Advancements - CHES 2024
0
rewiews
Explore advanced side-channel analysis techniques and their applications in cryptography at this CHES 2024 session, chaired by Shivam Bhasin.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
DEFCONConference
Web Timing Attacks That Actually Work - Practical Techniques and Tools
0
rewiews
Discover practical web timing attack techniques to uncover server secrets, masked vulnerabilities, and hidden attack surfaces using efficient, real-world methods and open-source tools.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
USENIX
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks
0
rewiews
Explore how multiple SMS senders can enhance location inference attacks through timing side channels, revealing improved accuracy and potential security vulnerabilities in mobile networks.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
load more...