YoVDO

Side Channel Attacks in the Cloud

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cryptography Courses Cloud Security Courses

Course Description

Overview

Explore side channel attacks in cloud environments through this 40-minute conference talk presented at 44CON Information Security Conference. Delve into isolation vulnerabilities, starting with Bernstein's attack applied to virtualization environments and its impact on cryptographic libraries. Examine an attack exploiting deduplication in cloud settings, demonstrating how flush and reload techniques can recover an entire AES key in under a minute. Gain insights into the need for improved isolation techniques and cryptographic library design. Cover topics including cloud environment overview, cache side channel attacks, AES review, Bernstein's attack, flush and reload attack, countermeasures, and conclusions.

Syllabus

Intro
OUTLINE
MOTIVATION
THE CLOUD ENVIRONMENT
CACHE SIDE CHANNEL ATTACKS
AES review
BERNSTEIN'S ATTACK
FLUSH AND RELOAD ATTACK
COUNTERMEASURES
CONCLUSIONS


Taught by

44CON Information Security Conference

Related Courses

Supply Chain Unchained - How To Be A Bad SaaS
44CON Information Security Conference via YouTube
Aviation Security 101
44CON Information Security Conference via YouTube
The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube
Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube
What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube