Overview
Explore side channel attacks in cloud environments through this 40-minute conference talk presented at 44CON Information Security Conference. Delve into isolation vulnerabilities, starting with Bernstein's attack applied to virtualization environments and its impact on cryptographic libraries. Examine an attack exploiting deduplication in cloud settings, demonstrating how flush and reload techniques can recover an entire AES key in under a minute. Gain insights into the need for improved isolation techniques and cryptographic library design. Cover topics including cloud environment overview, cache side channel attacks, AES review, Bernstein's attack, flush and reload attack, countermeasures, and conclusions.
Syllabus
Intro
OUTLINE
MOTIVATION
THE CLOUD ENVIRONMENT
CACHE SIDE CHANNEL ATTACKS
AES review
BERNSTEIN'S ATTACK
FLUSH AND RELOAD ATTACK
COUNTERMEASURES
CONCLUSIONS
Taught by
44CON Information Security Conference