Cache Side Channel Attacks - CPU Design As A Security Problem
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the intricacies of cache side channel attacks and their implications for CPU security in this 54-minute conference talk from the Hack In The Box Security Conference. Delve into how modern computer microarchitecture, particularly the cache subsystem, can be exploited to breach trust boundaries and access private data. Examine the resurgence of cache side channel attacks due to shared caches and cloud computing, and understand why software defenses are challenging yet often the only viable solution. Learn about real-world attack scenarios, including exfiltration of cryptographic keys and spying on user input. Gain insights from Anders Fogh, an experienced engineer and malware expert, as he discusses the mechanics of these attacks, detection methods using performance counters, and potential mitigation strategies.
Syllabus
Intro
Cache Side Channel Attacks
Who am I
Scope
Why is this interesting
How the data cache works
Summary
How is memory stored
Example code
How it works
Cash attacks
Victim time
Prime and Probe
Flush Load
Eject In Time
Shared Memory
Side Channel Attacks
Detecting Side Channels
Performance Counters
Flush Reload
Detecting cache misses
Analyzing the original code
Is the form scan useless
Flush and flush
Detecting flush
Twostage detection
Problems
Mitigation
Questions
Taught by
Hack In The Box Security Conference
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera