Leaky Processors - Stealing Your Secrets With Foreshadow
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the critical security vulnerability known as Foreshadow in this 41-minute conference talk from OWASP BeNeLux Day 2018. Delve into the intricacies of how this speculative execution attack can compromise Intel SGX enclaves, virtualization environments, and operating system kernel memory. Learn about the technical details of the attack, its implications for secure computing, and potential mitigation strategies. Gain insights into the broader landscape of hardware-based security threats and the ongoing challenges in protecting sensitive data in modern computing systems.
Syllabus
BeNeLux Day 2018: Leaky Processors: Stealing Your Secrets With Foreshadow - Jo Van Bulck
Taught by
OWASP Foundation
Related Courses
Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from SoftwarePaul G. Allen School via YouTube Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
Black Hat via YouTube CLKscrew - Exposing the Perils of Security-Oblivious Energy Management
Black Hat via YouTube Port Contention for Fun and Profit
IEEE via YouTube