YoVDO

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 - Session 3

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Computer Security Courses Side Channel Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the groundbreaking Hertzbleed attack in this conference talk, which transforms power side-channel attacks into remote timing attacks on x86 processors. Delve into the intricacies of Dynamic Voltage and Frequency Scaling (DVFS) on modern Intel CPUs and understand how frequency depends on power consumption. Examine data-dependent frequency variations and their implications for security. Investigate the frequency leakage model and its application to bit positions. Learn about the Supersingular Isogeny Key Encapsulation (SIKE) protocol and how it's vulnerable to adaptive chosen-ciphertext attacks. Analyze the remote timing attack model, discuss its implications, and explore potential mitigations for this novel security threat.

Syllabus

Intro
Power Side Channel vs Remote Timing
DVFS on a modern Intel CPU
Frequency Depends on Power
Example of Data-Dependent Frequency
Frequency Leakage Model
Case Study: Bit Positions
More experiments in the paper!
Supersingular Isogeny Key Encapsulation
An Important Step of SIKE's Decapsulation
Adaptive Chosen-Ciphertext Attack Idea
Target Implementation
Remote Timing Attack Model
Discussion & Takeaway
Mitigations


Taught by

TheIACR

Related Courses

Securing Digital Democracy
University of Michigan via Coursera
Computer Science 101
Stanford University via Coursera
Introduction to Cybersecurity for Business
University of Colorado System via Coursera
Proactive Computer Security
University of Colorado System via Coursera
How Computers Work
University of London International Programmes via Coursera