Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Side Channel Attacks in the Cloud

44CON Information Security Conference via YouTube

Overview

Explore side channel attacks in cloud environments through this 40-minute conference talk presented at 44CON Information Security Conference. Delve into isolation vulnerabilities, starting with Bernstein's attack applied to virtualization environments and its impact on cryptographic libraries. Examine an attack exploiting deduplication in cloud settings, demonstrating how flush and reload techniques can recover an entire AES key in under a minute. Gain insights into the need for improved isolation techniques and cryptographic library design. Cover topics including cloud environment overview, cache side channel attacks, AES review, Bernstein's attack, flush and reload attack, countermeasures, and conclusions.

Syllabus

Intro
OUTLINE
MOTIVATION
THE CLOUD ENVIRONMENT
CACHE SIDE CHANNEL ATTACKS
AES review
BERNSTEIN'S ATTACK
FLUSH AND RELOAD ATTACK
COUNTERMEASURES
CONCLUSIONS

Taught by

44CON Information Security Conference

Reviews

Start your review of Side Channel Attacks in the Cloud

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.