Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Side Channel Attacks
Showing:
168
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Conference on Computer-Aided Verification
Verified Software Security Down to Gates
0
rewiews
Explore hardware-software contracts synthesis, security vulnerability detection, and microarchitecture updates for verified software security. Gain insights into cutting-edge approaches for high-assurance computer systems design.
Add to list
1
Lesons
1 hour 9 minutes
On-Demand
Free-Video
IEEE
Side-Channel Attacks on Shared Search Indexes
0
rewiews
Explore side-channel attacks on shared search indexes, uncovering vulnerabilities in multi-tenant systems. Learn about STRESS attack techniques and their implications for popular services.
Add to list
17
Lesons
21 minutes
On-Demand
Free-Video
IEEE
Port Contention for Fun and Profit
0
rewiews
Explore SMT execution engine sharing as a side-channel leakage source, targeting ports to create a high-resolution timing side-channel for attacks on various architectures and applications.
Add to list
14
Lesons
22 minutes
On-Demand
Free-Video
IEEE
Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android
0
rewiews
Explores app-level protection against runtime information gathering on Android, proposing App Guardian to pause suspicious background processes and thwart malicious monitoring attempts without system modifications.
Add to list
17
Lesons
18 minutes
On-Demand
Free-Video
IEEE
Private Resource Allocators and Their Applications
0
rewiews
Introduces private resource allocators to prevent allocation-based side-channel attacks in systems like anonymous messaging, with various constructions offering different privacy guarantees and trade-offs in efficiency.
Add to list
16
Lesons
17 minutes
On-Demand
Free-Video
IEEE
WaveSpy - Remote and Through-Wall Screen Attack via mmWave Sensing
0
rewiews
Explores a novel screen attack method using mmWave sensing to remotely capture display content through walls, bypassing traditional security measures and demonstrating vulnerabilities in isolated environments.
Add to list
24
Lesons
16 minutes
On-Demand
Free-Video
USENIX Enigma Conference
LLC Cache Attacks: Applicability and Countermeasures
0
rewiews
Exploring Last Level Cache attacks, their applicability across various scenarios, and potential countermeasures to enhance system security and protect user privacy.
Add to list
11
Lesons
20 minutes
On-Demand
Free-Video
The Cyber Academy
Practical Side-Channel Attacks on Embedded Device Cryptography - Dr Owen Lo and Doug Carson
0
rewiews
Explore side-channel attacks on embedded devices, including techniques, history, and real-life examples. Learn about power analysis methods and their implications for cryptography.
Add to list
26
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
0
rewiews
Explore the Raccoon Attack on TLS-DH(E), its impact on cryptographic protocols, and potential countermeasures. Learn about side-channel vulnerabilities in key derivation processes.
Add to list
26
Lesons
39 minutes
On-Demand
Free-Video
TheIACR
TPM-FAIL - TPM Meetings Timing and Lattice Attacks
0
rewiews
Explore TPM vulnerabilities, timing attacks, and lattice-based cryptanalysis. Learn about ECDSA nonce issues and their impact on digital signatures in trusted computing.
Add to list
17
Lesons
34 minutes
On-Demand
Free-Video
TheIACR
LadderLeak
0
rewiews
Explore ECDSA and Schnorr signatures, focusing on randomness vulnerabilities and side-channel attacks. Learn about new attack records and countermeasures in cryptographic implementations.
Add to list
31
Lesons
46 minutes
On-Demand
Free-Video
TheIACR
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
0
rewiews
Explore vulnerabilities in CTR_DRBG cryptographic algorithm, focusing on cache attacks and key rotation flaws. Learn about potential risks in TLS handshakes and SGX execution.
Add to list
23
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks
0
rewiews
Explore side-channel attacks, including Spectre, timing attacks, and countermeasures. Learn about developer knowledge, resistance techniques, and future directions in cybersecurity.
Add to list
31
Lesons
1 hour 14 minutes
On-Demand
Free-Video
Colin O'Flynn
Blackhat EU 2013- Power Analysis for Cheapskates
0
rewiews
Explore power analysis attacks on embedded systems, from basic concepts to advanced techniques. Learn practical methods for implementing these attacks using affordable tools and hardware setups.
Add to list
37
Lesons
50 minutes
On-Demand
Free-Video
Hackaday
FPGA Glitching & Side Channel Attacks
0
rewiews
Explore side channel analysis and fault injection attacks on modern systems using low-cost hardware like FPGAs. Learn about powerful techniques once reserved for governments and researchers.
Add to list
22
Lesons
31 minutes
On-Demand
Free-Video
Practical Side Channel Attacks on Modern Browsers - Lecture 6
0
rewiews
Explore practical side channel attacks on modern browsers, covering XSS filters, timing attacks, clipboard vulnerabilities, and more. Learn about login history exploits and data URI schemes.
Add to list
15
Lesons
58 minutes
On-Demand
Free-Video
Linux Foundation
Dependency Hijacking Vulnerability in Microsoft Teams - Supply Chain Security Gaps
0
rewiews
Explore real-world dependency hijacking in Microsoft Teams, understanding software supply chain vulnerabilities and learning strategies to protect infrastructure, SDLC, and code.
Add to list
14
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Statistical Tools for Side-Channel Collision Attacks
0
rewiews
Statistical techniques enhance side-channel collision attacks, improving their effectiveness against cryptographic implementations. Higher-order moments and general forms address practical issues in various scenarios.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
Linux Foundation
Proactive Software Defense Against Side Channel Attacks
0
rewiews
Explore Intel's strategies for proactive OS-level defense against side channel attacks, focusing on Linux kernel improvements and community collaboration for enhanced security.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
OWASP Foundation
Exploiting Hardware Glitches and Side Channels in Perfect Software
0
rewiews
Uncover vulnerabilities in flawless software through hardware glitches and side-channel attacks. Learn advanced exploitation techniques for enhancing cybersecurity defenses.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
OWASP Foundation
The Less Hacked Path - Exploring Modern Security Vulnerabilities
0
rewiews
Explore fascinating side-channel attacks and low-cost tools used against modern technology. Learn about innovative hacking methods and how to secure against them from renowned security researcher Samy Kamkar.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
OWASP Foundation
Leaky Processors - Stealing Your Secrets With Foreshadow
0
rewiews
Explore the Foreshadow vulnerability in modern processors and its implications for data security. Learn about potential exploits and mitigation strategies.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
OWASP Foundation
Lessons from Trusting JavaScript Cryptography - Biting into the Forbidden Fruit
0
rewiews
Exploring real-world JavaScript cryptography implementations, debunking myths, and providing an updated perspective on JS crypto security through vulnerability analysis and practical examples.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Cooper
Practical and Affordable Side-Channel Attacks
0
rewiews
Explore affordable side-channel attacks with practical demonstrations, learning techniques to exploit vulnerabilities in cryptographic implementations and secure systems.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
Alan Turing Institute
Meltdown and Spectre - Professor Mark Handley, UCL
0
rewiews
Comprehensive explanation of Meltdown and Spectre vulnerabilities in modern CPUs, their impact on computer systems, and mitigation strategies. Explores CPU architecture, speculative execution, and side-channel attacks.
Add to list
1
Lesons
1 hour 43 minutes
On-Demand
Free-Video
media.ccc.de
TETRA Radio Security: Uncovering Secret Cryptography in Law Enforcement Communications
0
rewiews
Unveiling TETRA cryptography: Journey through radio jailbreaking, reverse-engineering, and exploiting vulnerabilities to analyze the proprietary algorithms used in critical communication systems worldwide.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
TheIACR
Gadgets II - Advanced Cryptographic Hardware Techniques
0
rewiews
Explore advanced cryptographic hardware techniques and implementations in this CHES 2024 session, chaired by Rei Ueno.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Confidential Computing Consortium
Pandora: Symbolic Validation of SGX
0
rewiews
Explore symbolic validation techniques for Intel SGX, enhancing security in confidential computing environments.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
Confidential Computing Consortium
BlindAI: Secure Remote ML Inference with Intel SGX Enclaves
0
rewiews
Explore secure remote ML inference using Intel SGX enclaves, balancing security, privacy, and performance. Learn about BlindAI's open-source solution for confidential computing.
Add to list
20
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Hardware Security III - CHES 2024
0
rewiews
Explore cutting-edge hardware security research presented at CHES 2024, covering innovative techniques and advancements in the field of cryptographic hardware and embedded systems.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
TheIACR
Hardware Security I - CHES 2024
0
rewiews
Explore hardware security topics presented at CHES 2024, chaired by Jan Richter-Brockmann. Gain insights into cutting-edge research and developments in the field of cryptographic hardware and embedded systems.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
TheIACR
Hardware Security II - CHES 2024
0
rewiews
Explore cutting-edge hardware security research at CHES 2024, featuring innovative papers and presentations chaired by Thomas Eisenbarth.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Paul G. Allen School
Building Trusted Systems on Top of Leaky Abstractions
0
rewiews
Exploring secure system design in complex tech stacks. Covers side-channel attacks, browser security, and trusted execution environments. Insights on building robust systems against known and unknown threats.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Black Hat
Faults in Our Bus - Novel Bus Fault Attack to Break Trusted Execution Environments in Embedded Systems
0
rewiews
Uncover novel bus fault attacks on Trusted Execution Environments in embedded systems, exploring vulnerabilities in SoC system buses and their implications for IoT security and TEE implementations.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Linux Plumbers Conference
Attack Vector Controls for Speculation Mitigations
0
rewiews
Explore advanced techniques for mitigating speculative execution vulnerabilities in Linux systems, focusing on attack vector controls and their implementation.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Black Hat
SystemUI as EvilPiP - Hijacking Attacks on Modern Mobile Devices
0
rewiews
Reveals new Android attack surface 'PiP', exploiting vulnerabilities to bypass security measures and perform stealthy hijacking attacks on modern devices without permissions or user awareness.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
WEareTROOPERS
Say Hello to Your New Cache Flow
0
rewiews
Explore innovative cache flow techniques in IT security with experts Geoffrey Bertoli, Rémi Jullian, and Théo Gordyjan at TROOPERS24 conference in Heidelberg, Germany.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
OffensiveCon
From Phantom to Inception: Leaking Data Using Branch-Free Predictor Training
0
rewiews
Explore data leakage techniques using branch-free predictor training, from phantom to inception, in modern processors.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Linux Foundation
Confidential Computing and Privacy-Enhancing Technologies - The Landscape
0
rewiews
Explore confidential computing and privacy-enhancing technologies for secure cloud adoption. Compare approaches, discuss open source's role, and see a demo using the Enarx project.
Add to list
16
Lesons
40 minutes
On-Demand
Free-Video
Squid: Schools for Quantum Information Development
Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World
0
rewiews
Explore groundbreaking quantum cryptographic schemes that provide security against unlimited side-channel attacks and intrusion, advancing beyond classical bounded leakage limitations for enhanced data protection.
Add to list
1
Lesons
33 minutes
On-Demand
Free-Video
TheIACR
Side Channel Metrics and Masking Schemes - CHES 2022 Session
0
rewiews
Explore advanced side channel metrics and masking schemes in cryptography, enhancing security against hardware attacks and information leakage.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
TheIACR
MIRACLE: MIcRo-ArChitectural Leakage Evaluation - Best Paper Award Session
0
rewiews
Explore groundbreaking research on micro-architectural leakage evaluation in cryptographic hardware, presented by award-winning experts at CHES 2022.
Add to list
1
Lesons
1 hour 29 minutes
On-Demand
Free-Video
TheIACR
Efficient Masking Techniques in Cryptography
0
rewiews
Explore advanced techniques in efficient masking for cryptographic implementations, enhancing security against side-channel attacks in hardware and software systems.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
TheIACR
Side Channel Attacks on Post-Quantum Implementations - Session 1
0
rewiews
Explore cutting-edge research on side channel attacks targeting post-quantum cryptographic implementations, presented at CHES 2022 conference.
Add to list
1
Lesons
1 hour 27 minutes
On-Demand
Free-Video
TheIACR
Leakage Resilience and Masking Verification in Cryptography
0
rewiews
Explore cutting-edge techniques in cryptographic hardware security, focusing on leakage resilience and masking verification methods for enhanced protection against side-channel attacks.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
TheIACR
Masking Techniques in Cryptographic Hardware - Session I
0
rewiews
Explore advanced masking techniques for cryptographic hardware security, presented by experts at CHES 2023. Gain insights into cutting-edge research and practical applications.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
TheIACR
Side Channel Attacks and Masking - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge research on side channel attacks and masking techniques in cryptography, featuring presentations from leading experts in the field.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Side Channels in Cryptography - Part 1
0
rewiews
Explore cutting-edge research on side channel attacks in cryptography, presented at a leading conference. Gain insights into vulnerabilities and potential countermeasures.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Side Channels in Cryptography - Part 2
0
rewiews
Explore advanced cryptographic concepts and side channel attacks in this session from Crypto 2023, chaired by Chitchanok Chuengsatiansup.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Side Channels in Cryptography - Session 2
0
rewiews
Explore advanced cryptographic concepts and latest research on side channel attacks in this Crypto 2023 session, chaired by Chitchanok Chuengsatiansup.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
TheIACR
SCA LDPC: A Code-Based Framework for Key Recovery Side-Channel Attacks on Post-Quantum Encryption
0
rewiews
Explore a framework for key recovery side-channel attacks on post-quantum encryption, focusing on LDPC code-based systems and their vulnerabilities.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
ACM SIGPLAN
Leakage Models: A Leaky Abstraction in Cryptographic Software Verification
0
rewiews
Explore gate-level verification for cryptographic software timing, abandoning leakage models. Discover a novel approach to ensure constant-time execution in hardware implementations.
Add to list
1
Lesons
12 minutes
On-Demand
Free-Video
secwestnet
Speculative Execution Vulnerabilities: From Spectre to Control Flow Hijack
0
rewiews
Comprehensive exploration of speculative execution attacks, from original Spectre to new vulnerabilities. Clear explanations of exploitation challenges and processor vulnerabilities, with insights on high-resolution timers as potential weapons.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
IEEE
Spectre Attacks Exploiting Speculative Execution
0
rewiews
Explore speculative execution vulnerabilities in modern processors, their impact on system security, and potential countermeasures to protect against Spectre attacks.
Add to list
11
Lesons
21 minutes
On-Demand
Free-Video
IEEE
Verifying and Synthesizing Constant-Resource Implementations with Types
0
rewiews
Explores a type system for verifying constant-resource implementations, enhancing security against side-channel attacks while allowing natural programming models. Introduces resource-aware noninterference and automated repair techniques.
Add to list
11
Lesons
19 minutes
On-Demand
Free-Video
Fields Institute
Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
0
rewiews
Explore advanced quantum cryptography threats, focusing on multiphoton and side-channel attacks in mistrustful settings. Learn about cutting-edge research and potential countermeasures.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
TheIACR
Identity-Based Encryption Resilient to Continual Auxiliary Inputs
0
rewiews
Explore identity-based encryption resilient to auxiliary inputs, featuring novel theorems, constructions, and extensions for enhanced security in cryptographic systems.
Add to list
18
Lesons
21 minutes
On-Demand
Free-Video
The Cyber Academy
Cracking Light-weight Cryptography with Side Channels
0
rewiews
Explore side-channel attacks on lightweight cryptography systems, understanding vulnerabilities and defense strategies for secure implementation in resource-constrained environments.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Masking Schemes and Their Analysis - Session at CHES 2022
0
rewiews
Explore advanced masking schemes and analytical techniques for enhancing cryptographic security in hardware implementations.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
TheIACR
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3
0
rewiews
Explore how power side-channel attacks transform into remote timing attacks on x86 processors, examining DVFS, frequency leakage, and implications for cryptographic systems like SIKE.
Add to list
15
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Side Channel Attacks on Post-Quantum Implementations - Part I
0
rewiews
Explore cutting-edge side channel attacks on post-quantum cryptography implementations in this CHES 2023 session, chaired by Thomas Eisenbarth. Gain insights into emerging security challenges and countermeasures.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Post-Quantum Implementations - Part 2
0
rewiews
Explore advanced side-channel attacks on post-quantum cryptography implementations, featuring cutting-edge research and expert insights from CHES 2023.
Add to list
1
Lesons
1 hour 14 minutes
On-Demand
Free-Video
TheIACR
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms - Best Paper CHES 2023
0
rewiews
Explore award-winning research on threshold implementations in software, focusing on micro-architectural leakages in algorithms and their impact on cryptographic security.
Add to list
14
Lesons
31 minutes
On-Demand
Free-Video
TheIACR
Dealing with Microarchitectural Effects - CHES 2023
0
rewiews
Explore microarchitectural effects in cryptographic hardware and embedded systems, focusing on security implications and mitigation strategies for modern computing architectures.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Post-Quantum Implementations - Part 3
0
rewiews
Explore cutting-edge side-channel attacks on post-quantum cryptography implementations in this CHES 2023 session, chaired by Matthias Kannwischer.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Symmetric Algorithms II
0
rewiews
Explore advanced side-channel attacks on symmetric algorithms in this CHES 2023 session, chaired by Thorben Moos. Gain insights into cutting-edge research and developments in cryptographic hardware security.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Attacks on Symmetric Algorithms - Part I
0
rewiews
Explore cutting-edge research on side-channel attacks targeting symmetric cryptographic algorithms, presented by experts at CHES 2023. Gain insights into vulnerabilities and potential countermeasures.
Add to list
1
Lesons
1 hour 17 minutes
On-Demand
Free-Video
TheIACR
Masking Techniques in Cryptography - Part II
0
rewiews
Explore advanced masking techniques for cryptographic hardware security, presented by experts at CHES 2023. Gain insights into cutting-edge research and practical applications.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis - Session 10
0
rewiews
Explore cryptanalysis techniques and methods for breaking encryption systems, enhancing your understanding of cryptographic vulnerabilities and security measures.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Co-Design and Co-Verification of Masked Software Implementations on CPUs
0
rewiews
Explore co-design and co-verification of masked software implementations on CPUs, focusing on physical side-channel attacks, hardware/software gaps, and innovative solutions.
Add to list
12
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Machine Learning for Side-Channel Attacks
0
rewiews
Explore machine learning techniques for side-channel attacks, enhancing cybersecurity knowledge and practical skills in this cutting-edge field of information security.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
TheIACR
CHES Test-of-Time Award Session
0
rewiews
Explore the CHES Test-of-Time Award, its background, and the impact of the winning paper on cryptographic notation, discoveries, and applications.
Add to list
13
Lesons
31 minutes
On-Demand
Free-Video
Simons Institute
The Rise of Tractable Circuits - From Cryptography to Continuous Generative Models
0
rewiews
Exploring tractable circuits' applications in cryptography and continuous generative models, showcasing advancements in neuro-symbolic approaches and probabilistic inference for AI reasoning.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
Linux Foundation
Using Hardware Protected Keys with the Linux Crypto API
0
rewiews
Learn to use hardware-protected keys with Linux Crypto API for enhanced security in embedded systems. Explore implementation, benefits, and potential challenges in this in-depth presentation.
Add to list
12
Lesons
36 minutes
On-Demand
Free-Video
TheIACR
Side-Channel Countermeasures
0
rewiews
Explore cutting-edge side-channel countermeasures in cryptography at this Eurocrypt 2024 session, featuring expert presentations on the latest research and advancements in the field.
Add to list
1
Lesons
1 hour 5 minutes
On-Demand
Free-Video
TheIACR
Leakage Resilience - Eurocrypt 2024
0
rewiews
Explore cutting-edge research on leakage resilience in cryptography at this Eurocrypt 2024 session, featuring presentations on advanced security techniques and protocols.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
TheIACR
Leakage Resilience in Cryptography - FSE 2024 Session
0
rewiews
Explore cutting-edge research on leakage resilience in cryptography, examining advanced techniques to protect against side-channel attacks and enhance data security.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
ACM SIGPLAN
Lifting Compiler Security Properties to Stronger Attackers: The Speculation Case
0
rewiews
Explore compiler security properties against speculative execution attacks, focusing on lifting guarantees to stronger attacker models and developing a formal framework for well-formedness conditions.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Side Channel - Panel Voto Electrónico Local
0
rewiews
Expertos debaten sobre la seguridad y desafíos del voto electrónico en Argentina, analizando sus implicaciones técnicas, legales y democráticas.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Exec ASLR - Abusing Intel Branch Predictors to Bypass ASLR
0
rewiews
Explore a new Spectre v2 technique to bypass ASLR on Intel CPUs by abusing branch predictors, with demos on x86 internals, side-channel attacks, and speculative execution.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
BruCON Security Conference
Weaknesses in WPA3's Dragonfly Handshake
0
rewiews
Uncovers critical vulnerabilities in WPA3's Dragonfly handshake, demonstrating password partitioning attacks and discussing practical implications for Wi-Fi security. Explores countermeasures and assesses WPA3's effectiveness as a modern security protoco…
Add to list
34
Lesons
1 hour 1 minute
On-Demand
Free-Video
USENIX Enigma Conference
A Sound Mind in a Vulnerable Body - Practical Hardware Attacks on Deep Learning
0
rewiews
Explores hardware vulnerabilities in deep learning systems, demonstrating how fault injection and side-channel attacks can compromise model accuracy and steal proprietary information, highlighting the need for robust ML-level defenses.
Add to list
14
Lesons
22 minutes
On-Demand
Free-Video
OWASP Foundation
FIESTA - An HTTPS Side-Channel Party
0
rewiews
Explore HTTPS side-channel vulnerabilities and a new tool, FIESTA, for testing and exploiting these issues. Learn about a novel side-channel affecting major tech companies and its implications for online security.
Add to list
22
Lesons
42 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
A Software Approach to Defeating Side Channels in Last-Level Caches
0
rewiews
Explore techniques to mitigate side-channel attacks in last-level caches, focusing on Copy-On-Access and Cacheability Management methods for enhanced cloud security.
Add to list
16
Lesons
27 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
On Code Execution Tracking via Power Side-Channel
0
rewiews
Explore power side-channel analysis for code execution tracking in embedded systems, covering key extraction attacks, control flow integrity, and Hidden Markov Models for security applications.
Add to list
20
Lesons
29 minutes
On-Demand
Free-Video
Black Hat
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
0
rewiews
Unveiling a new speculative execution attack exploiting SWAPGS instruction, bypassing existing CPU and kernel protections. Explores side-channel vulnerabilities and their implications for system security.
Add to list
6
Lesons
49 minutes
On-Demand
Free-Video
Black Hat
Practical Side-Channel Attacks Against WPA-TKIP
0
rewiews
Explore practical side-channel attacks against WPA-TKIP in Wi-Fi networks, analyzing vulnerabilities and countermeasures in this widely-used legacy protocol.
Add to list
19
Lesons
34 minutes
On-Demand
Free-Video
Black Hat
Meltdown - Basics, Details, Consequences
0
rewiews
Explore Meltdown, a critical security vulnerability that breaks fundamental isolation between user applications and operating systems, allowing unauthorized access to system memory and sensitive data.
Add to list
33
Lesons
47 minutes
On-Demand
Free-Video
Black Hat
Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers
0
rewiews
Novel side-channel attacks on mixed-design chips exploiting electromagnetic leaks in radio signals, potentially breaking cryptography over large distances. Explores discovery, impact, and countermeasures.
Add to list
20
Lesons
46 minutes
On-Demand
Free-Video
Black Hat
A Hacker's Guide to Reducing Side-Channel Attack Surfaces Using Deep Learning
0
rewiews
Explore deep-learning techniques to identify and reduce side-channel attack vulnerabilities, leveraging AI explainability for efficient implementation assessment and improved security.
Add to list
11
Lesons
47 minutes
On-Demand
Free-Video
nullcon
Side-Channel Attacks
0
rewiews
Explore side-channel attacks and machine learning in cybersecurity with expert Stjepan Picek. Learn practical techniques, profiling methods, and key outcomes in this informative webinar.
Add to list
13
Lesons
20 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Bypassing Hardware-Based Trusted Boot Through x86 Downgrade
0
rewiews
Exploiting microcode loader vulnerability to downgrade CPU microcode, enabling attacks on Intel security technologies like Boot Guard and TXT by loading older, vulnerable versions of Authenticated Code Modules.
Add to list
19
Lesons
33 minutes
On-Demand
Free-Video
Black Hat
I Block You Because I Love You - Social Account Identification Attack Against a Website Visitor
0
rewiews
Practical side-channel attack to identify social web service accounts of website visitors, compromising anonymity through user profiles and activities.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
TLBleed - When Protecting Your CPU Caches is Not Enough
0
rewiews
Explore TLBleed, a novel side-channel attack leaking information from Translation Lookaside Buffers, demonstrating vulnerabilities beyond CPU caches and challenging current security measures.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Black Hat
Demystifying Key Stretching and PAKEs
0
rewiews
Explore key stretching and PAKEs: their history, best practices, and applications in encrypted cloud services. Learn to create toy algorithms and understand their importance in cybersecurity.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers
0
rewiews
Explore practical attacks on obfuscated ciphers, focusing on White-Box Cryptography. Learn techniques to assess security, understand vulnerabilities, and evaluate robustness against key extraction in software implementations.
Add to list
29
Lesons
57 minutes
On-Demand
Free-Video
Black Hat
Exploiting Out-of-Order Execution for Covert Cross-VM Communication
0
rewiews
Explore a novel side channel attack exploiting CPU out-of-order execution for covert cross-VM communication in cloud environments, with live demos and mitigation techniques.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
Black Hat
HEIST - HTTP Encrypted Information can be Stolen Through TCP-Windows
0
rewiews
Unveils HEIST, a browser-based attack exploiting SSL/TLS vulnerabilities without network access. Demonstrates how to leak cross-origin response sizes, enabling compression-based attacks and sensitive information extraction from popular websites.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
Over the Edge - Silently Owning Windows 10's Secure Browser
0
rewiews
Exploiting Windows 10's memory deduplication feature to silently compromise Microsoft Edge, bypassing security measures and gaining arbitrary memory access through JavaScript-based attacks.
Add to list
10
Lesons
33 minutes
On-Demand
Free-Video
TheIACR
Leakage-Resilient Symmetric Cryptography under Empirical
0
rewiews
Explore leakage-resilient symmetric cryptography and its empirical applications in this insightful talk by leading researchers in the field.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
load more...