Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

TheIACR via YouTube Direct link

An Important Step of SIKE's Decapsulation

10 of 15

10 of 15

An Important Step of SIKE's Decapsulation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Power Side Channel vs Remote Timing
  3. 3 DVFS on a modern Intel CPU
  4. 4 Frequency Depends on Power
  5. 5 Example of Data-Dependent Frequency
  6. 6 Frequency Leakage Model
  7. 7 Case Study: Bit Positions
  8. 8 More experiments in the paper!
  9. 9 Supersingular Isogeny Key Encapsulation
  10. 10 An Important Step of SIKE's Decapsulation
  11. 11 Adaptive Chosen-Ciphertext Attack Idea
  12. 12 Target Implementation
  13. 13 Remote Timing Attack Model
  14. 14 Discussion & Takeaway
  15. 15 Mitigations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.