YoVDO

Leaky Processors - Stealing Your Secrets With Foreshadow

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Computer Architecture Courses Data Protection Courses Side Channel Attacks Courses Operating System Security Courses Hardware Vulnerabilities Courses Intel SGX Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical security vulnerability known as Foreshadow in this 41-minute conference talk from OWASP BeNeLux Day 2018. Delve into the intricacies of how this speculative execution attack can compromise Intel SGX enclaves, virtualization environments, and operating system kernel memory. Learn about the technical details of the attack, its implications for secure computing, and potential mitigation strategies. Gain insights into the broader landscape of hardware-based security threats and the ongoing challenges in protecting sensitive data in modern computing systems.

Syllabus

BeNeLux Day 2018: Leaky Processors: Stealing Your Secrets With Foreshadow - Jo Van Bulck


Taught by

OWASP Foundation

Related Courses

Introduction to Operating Systems
Indian Institute of Technology Madras via Swayam
Home Networking Basics
Cisco via Coursera
Cybersecurity Roles, Processes & Operating System Security
IBM via Coursera
Operating Systems and Security
IBM via edX
A Complete Cyber Security Guide For Beginners 2024
Udemy