YoVDO

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cybersecurity Courses Cryptography Courses Mobile Device Security Courses

Course Description

Overview

Explore a conference talk from CCS 2016 that delves into ECDSA key extraction from mobile devices using nonintrusive physical side channels. Learn about the research conducted by experts from Technion, Tel Aviv University, and The University of Adelaide as they present their findings on this critical cybersecurity topic. Gain insights into the fragile analysis, results, equipment used, and a demonstration of the key extraction process. Understand the potential vulnerabilities in mobile device security and discover proposed countermeasures to protect against such attacks. The presentation concludes with a Q&A session, allowing for a deeper understanding of this cutting-edge research in computer and communications security.

Syllabus

Introduction
Fragile analysis
Results
Equipment
Demo
Lab Recording
K Extraction
Analysis
countermeasures
QA


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube