YoVDO

Spook.js - Attacking Chrome Strict Site Isolation via Speculative Execution

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses Browser Security Courses Speculative Execution Courses

Course Description

Overview

Explore a cutting-edge security research presentation that delves into the vulnerabilities of Chrome's Strict Site Isolation through speculative execution attacks. Learn about the innovative Spook.js technique developed by an international team of researchers from the University of Michigan, University of Adelaide, Georgia Institute of Technology, and Tel Aviv University. Gain insights into how this attack method bypasses Chrome's security measures, potentially compromising user data and privacy. Understand the implications of this research for web browser security and the ongoing challenges in protecting against side-channel attacks in modern processors.

Syllabus

Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Ret2spec- Speculative Execution Using Return Stack Buffers
Association for Computing Machinery (ACM) via YouTube
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
Black Hat via YouTube
Mill vs. Spectre - Performance and Security
Strange Loop Conference via YouTube
Spectre Attacks Exploiting Speculative Execution
IEEE via YouTube
High-Assurance Cryptography in the Spectre Era
IEEE via YouTube