Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

TheIACR via YouTube Direct link

Intro

1 of 15

1 of 15

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Power Side Channel vs Remote Timing
  3. 3 DVFS on a modern Intel CPU
  4. 4 Frequency Depends on Power
  5. 5 Example of Data-Dependent Frequency
  6. 6 Frequency Leakage Model
  7. 7 Case Study: Bit Positions
  8. 8 More experiments in the paper!
  9. 9 Supersingular Isogeny Key Encapsulation
  10. 10 An Important Step of SIKE's Decapsulation
  11. 11 Adaptive Chosen-Ciphertext Attack Idea
  12. 12 Target Implementation
  13. 13 Remote Timing Attack Model
  14. 14 Discussion & Takeaway
  15. 15 Mitigations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.