Cache Side Channel Attack - Exploitability and Countermeasures

Cache Side Channel Attack - Exploitability and Countermeasures

Black Hat via YouTube Direct link

Demo: AES Key Recovery Across VMS

9 of 19

9 of 19

Demo: AES Key Recovery Across VMS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cache Side Channel Attack - Exploitability and Countermeasures

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Feasibility Trend
  3. 3 Cache Architecture
  4. 4 Flush Reload Attack
  5. 5 Evict + Reload Attack Summary
  6. 6 Prime + Probe Attack Summary
  7. 7 How to retrieve information?
  8. 8 Attack Comparison
  9. 9 Demo: AES Key Recovery Across VMS
  10. 10 Browser Javascript
  11. 11 Smart Phone Applications
  12. 12 Trust Execution Environment
  13. 13 Design Cache Leakage Free Code
  14. 14 Page Coloring
  15. 15 Cache Allocation Technology
  16. 16 Behavior Detection
  17. 17 Countermeasure Comparison (Requirements)
  18. 18 Countermeasure Comparison (Coverage)
  19. 19 Key Takeaways

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.