ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a conference talk from CCS 2016 that delves into ECDSA key extraction from mobile devices using nonintrusive physical side channels. Learn about the research conducted by experts from Technion, Tel Aviv University, and The University of Adelaide as they present their findings on this critical cybersecurity topic. Gain insights into the fragile analysis, results, equipment used, and a demonstration of the key extraction process. Understand the potential vulnerabilities in mobile device security and discover proposed countermeasures to protect against such attacks. The presentation concludes with a Q&A session, allowing for a deeper understanding of this cutting-edge research in computer and communications security.
Syllabus
Introduction
Fragile analysis
Results
Equipment
Demo
Lab Recording
K Extraction
Analysis
countermeasures
QA
Taught by
ACM CCS
Related Courses
Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor BrowserAssociation for Computing Machinery (ACM) via YouTube DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube