🎧 Forschungsquartett
Side-Channel-Angriffe: Was Computer über uns verraten (20min)
Listen
Details
#SideChannelAttacks #CybersecurityResearch #Forschungsquartett
Zhang et al.'s "Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction"
Third in the session was Zhang et al.'s "Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction" which analyzes cache activities using an autoencoder to reveal image reconstruction limits. (www.acsac.org/2024/p...) 4/6
#SideChannelAttacks #ML
Lindemann's "Faking deduplication to prevent timing side-channel attacks on memory deduplication"
Then followed Lindemann's "Faking deduplication to prevent timing side-channel attacks on memory deduplication," showcasing a novel approach to secure #MemoryDeduplication without sacrificing efficiency. (www.acsac.org/2024/p...) 3/6
#SideChannelAttacks #CyberSecurity
At my RBTC Defense Against the Dark Arts demo, we explored timing side-channel attacks. With the help of an audience volunteer, we cracked a keypad safe.
A huge thank you to everyone who attended, helped setup, and asked great questions!
#HardwareHacking #SideChannelAttacks
At #hw_ioNL2024, Daniel Genkin spoke about iLeakage, revealing how speculative execution attacks still threaten browser isolation primitives despite ongoing mitigations.
YouTube Link: youtu.be/uXWZB-EM6wI
#sidechannelattacks #hardware #software
Your fingerprints can be recreated from the sounds made when you swipe on a touchscreen #sidechannelattacks
www.tomshardware.com/tech-industr...