Side Channel Attacks in the Cloud
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore side channel attacks in cloud environments through this 40-minute conference talk presented at 44CON Information Security Conference. Delve into isolation vulnerabilities, starting with Bernstein's attack applied to virtualization environments and its impact on cryptographic libraries. Examine an attack exploiting deduplication in cloud settings, demonstrating how flush and reload techniques can recover an entire AES key in under a minute. Gain insights into the need for improved isolation techniques and cryptographic library design. Cover topics including cloud environment overview, cache side channel attacks, AES review, Bernstein's attack, flush and reload attack, countermeasures, and conclusions.
Syllabus
Intro
OUTLINE
MOTIVATION
THE CLOUD ENVIRONMENT
CACHE SIDE CHANNEL ATTACKS
AES review
BERNSTEIN'S ATTACK
FLUSH AND RELOAD ATTACK
COUNTERMEASURES
CONCLUSIONS
Taught by
44CON Information Security Conference
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera