Главная
Study mode:
on
1
Intro
2
Power Side Channel vs Remote Timing
3
DVFS on a modern Intel CPU
4
Frequency Depends on Power
5
Example of Data-Dependent Frequency
6
Frequency Leakage Model
7
Case Study: Bit Positions
8
More experiments in the paper!
9
Supersingular Isogeny Key Encapsulation
10
An Important Step of SIKE's Decapsulation
11
Adaptive Chosen-Ciphertext Attack Idea
12
Target Implementation
13
Remote Timing Attack Model
14
Discussion & Takeaway
15
Mitigations
Description:
Explore the groundbreaking Hertzbleed attack in this conference talk, which transforms power side-channel attacks into remote timing attacks on x86 processors. Delve into the intricacies of Dynamic Voltage and Frequency Scaling (DVFS) on modern Intel CPUs and understand how frequency depends on power consumption. Examine data-dependent frequency variations and their implications for security. Investigate the frequency leakage model and its application to bit positions. Learn about the Supersingular Isogeny Key Encapsulation (SIKE) protocol and how it's vulnerable to adaptive chosen-ciphertext attacks. Analyze the remote timing attack model, discuss its implications, and explore potential mitigations for this novel security threat.

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

TheIACR
Add to list