Spook.js - Attacking Chrome Strict Site Isolation via Speculative Execution
Offered By: IEEE via YouTube
Course Description
Overview
Explore a cutting-edge security research presentation that delves into the vulnerabilities of Chrome's Strict Site Isolation through speculative execution attacks. Learn about the innovative Spook.js technique developed by an international team of researchers from the University of Michigan, University of Adelaide, Georgia Institute of Technology, and Tel Aviv University. Gain insights into how this attack method bypasses Chrome's security measures, potentially compromising user data and privacy. Understand the implications of this research for web browser security and the ongoing challenges in protecting against side-channel attacks in modern processors.
Syllabus
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Ret2spec- Speculative Execution Using Return Stack BuffersAssociation for Computing Machinery (ACM) via YouTube Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube High-Assurance Cryptography in the Spectre Era
IEEE via YouTube