Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Cache Attacks
Showing:
16
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
IEEE
Dragonblood - Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
0
rewiews
Analyze vulnerabilities in WPA3 and EAP-pwd protocols, exploring attacks on clients and access points, information leakage, and potential solutions for Wi-Fi security.
Add to list
18
Lesons
17 minutes
On-Demand
Free-Video
IEEE
The 9 Lives of Bleichenbacher's CAT - New Cache Attacks on TLS Implementations
0
rewiews
Explores novel cache-based attacks on TLS implementations, demonstrating vulnerabilities in popular systems and introducing a parallelization technique for padding oracle attacks against RSA.
Add to list
14
Lesons
17 minutes
On-Demand
Free-Video
IEEE
NetCAT - Practical Cache Attacks from the Network
0
rewiews
Reverse engineering DDIO to demonstrate NetCAT, a network-based cache attack enabling remote keystroke timing attacks and covert channels, highlighting security risks in modern Intel processors.
Add to list
21
Lesons
17 minutes
On-Demand
Free-Video
USENIX Enigma Conference
LLC Cache Attacks: Applicability and Countermeasures
0
rewiews
Exploring Last Level Cache attacks, their applicability across various scenarios, and potential countermeasures to enhance system security and protect user privacy.
Add to list
11
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
0
rewiews
Explore vulnerabilities in CTR_DRBG cryptographic algorithm, focusing on cache attacks and key rotation flaws. Learn about potential risks in TLS handshakes and SGX execution.
Add to list
23
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Microarchitecture - CHES 2024
0
rewiews
Explore microarchitectural side-channel attacks and defenses in cryptographic systems at CHES 2024, featuring cutting-edge research and expert insights.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
WEareTROOPERS
Say Hello to Your New Cache Flow
0
rewiews
Explore innovative cache flow techniques in IT security with experts Geoffrey Bertoli, Rémi Jullian, and Théo Gordyjan at TROOPERS24 conference in Heidelberg, Germany.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
NorthSec
Non-Crypto Constant-Time Coding
0
rewiews
Explore cache attacks, SGX technology, and tools for writing constant-time code to protect confidential data from side-channel vulnerabilities in various computing contexts.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
0
rewiews
Explore how Intel SGX can be exploited to implement stealthy malware, extract secret RSA keys, and steal Bitcoins through cache attacks and other vulnerabilities in trusted execution environments.
Add to list
37
Lesons
54 minutes
On-Demand
Free-Video
USENIX
Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think
0
rewiews
Explores indirect cache attacks bypassing software-based defenses by exploiting MMU operations, challenging existing security measures and revealing vulnerabilities in cache isolation techniques.
Add to list
14
Lesons
23 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Hardware Side Channels in Virtualized Environments
0
rewiews
Explore hardware side channel vulnerabilities in virtualized environments, focusing on cloud-based attacks. Learn about attack surfaces, demonstrations, and potential mitigations for these security risks.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
0
rewiews
Explore a cache attack on the BLISS lattice-based signature scheme, examining vulnerabilities and potential security implications for post-quantum cryptography.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
The 9 Lives of Bleichenbacher's CAT - New Cache Attacks on TLS Implementations
0
rewiews
Explore new cache attacks on TLS implementations, focusing on Bleichenbacher's CAT and its evolution in modern cryptography.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
TheIACR
Workshop on Attacks in Crypto 2020 Sessions I and II
0
rewiews
Explore cutting-edge cryptographic attacks: lattice, side-channel, timing, and cache attacks on TPMs, PRNGs, and Bluetooth. Learn from experts about vulnerabilities in real-world systems.
Add to list
1
Lesons
1 hour 23 minutes
On-Demand
Free-Video
TheIACR
Side Channels and Leakage in Cryptography
0
rewiews
Explore cutting-edge research on cryptographic vulnerabilities and protection mechanisms in this expert-led session from a prestigious conference.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
USENIX
CacheWarp: Software-based Fault Injection Using Selective State Reset
0
rewiews
Discover how CacheWarp exploits AMD SEV vulnerabilities through software-based fault injection, enabling attacks on cryptographic systems and privilege escalation in virtual machines.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
load more...