ZombieLoad Attack
Offered By: media.ccc.de via YouTube
Course Description
Overview
Explore the ZombieLoad attack, a powerful vulnerability affecting most Intel CPUs, in this 56-minute conference talk from the 36C3 event. Learn how this attack allows leaking data from various sources, including user processes, kernels, secure enclaves, and even across virtual machines. Discover why ZombieLoad remains effective even on CPUs with Meltdown fixes. Examine the attack's relationship to the original Meltdown vulnerability and compare it to other microarchitectural data-sampling (MDS) attacks. Witness live demonstrations of ZombieLoad's capabilities, including monitoring browsing behavior, stealing cryptographic keys, and leaking root-password hashes on Linux. Discuss the challenges in mitigating ZombieLoad and its implications for hardware vendors, software vendors, and users. Gain insights into the future of Meltdown attacks and potential countermeasures through this comprehensive presentation by security researchers Michael Schwarz, Moritz Lipp, and Daniel Gruss.
Syllabus
Intro
Introduction
Welcome
Daniel Goose
Cache
Meltdown Attack
Technical Details
Future Work
ZombieLoad Cache
Domino Attack
Credit Card Attack
Variants
Mitigation
No Variants
Fast Variant
Time Line
Faults
Conclusion
Questions
Taught by
media.ccc.de
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube