YoVDO

Side Channel Attacks in the Cloud

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cryptography Courses Cloud Security Courses

Course Description

Overview

Explore side channel attacks in cloud environments through this 40-minute conference talk presented at 44CON Information Security Conference. Delve into isolation vulnerabilities, starting with Bernstein's attack applied to virtualization environments and its impact on cryptographic libraries. Examine an attack exploiting deduplication in cloud settings, demonstrating how flush and reload techniques can recover an entire AES key in under a minute. Gain insights into the need for improved isolation techniques and cryptographic library design. Cover topics including cloud environment overview, cache side channel attacks, AES review, Bernstein's attack, flush and reload attack, countermeasures, and conclusions.

Syllabus

Intro
OUTLINE
MOTIVATION
THE CLOUD ENVIRONMENT
CACHE SIDE CHANNEL ATTACKS
AES review
BERNSTEIN'S ATTACK
FLUSH AND RELOAD ATTACK
COUNTERMEASURES
CONCLUSIONS


Taught by

44CON Information Security Conference

Related Courses

Architecting Microsoft Azure Solutions
Microsoft via edX
Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Network Security
Georgia Institute of Technology via Udacity
Microsoft Professional Orientation : Cloud Administration
Microsoft via edX
Cyber Threats and Attack Vectors
University of Colorado System via Coursera