Side Channel Security
Side channels have become increasingly important over the past two decades in our digital world. With attacks like Meltdown and Spectre, which internally use side channels, they have gained worldwide relevance, as most computers on the planet are affected, and also the corresponding publicity. But why are side channels relevant to me? Because they are relevant to everyone!
This course is not just a list of side-channel effects and how to exploit them. We provide you with the experience of learning about side channels in a group of students living in a shared apartment. Together with them, you will figure out what side channels are, why they are relevant for security, and how they can inadvertently influence us or leak our own most personal secrets to others.
Join us on edX: https://www.edx.org/professional-certificate/tugrazx-side-channel-security-basics, and subscribe to be notified when a new episode is released!
How to Stop Cache Attacks Like Flush+Reload, Flush+Flush and Prime+Probe?
From Wall Street to Silicon: Huge System Crash ahead due to CPU Speculation?
Guesswork in the Machine: How Computers 'Predict' Your Next Move with Speculative Execution
Eviction from all the Cash inside your Computer? Two Professors know why!
Did Someone put Millions in Cash inside your Computer!? The Shocking Truth about Processors
Unraveling the Secrets of Microarchitecture
The Thin Digital Line: Legal Consequences of Crossing Architectural Boundaries
Breaking Architectural Boundaries with Side Channels and in the Real World
Cybersecurity in the Age of Pandemics: Will Computers Rebel Against Masking and Isolation?
Secrets in Disguise: Masking, Isolation, and the Myths of Cybersecurity
Another MASK SCANDAL: Hiding behind a Mask to avoid Side Channels
What is the Difference Between Architecture and Microarchitecture?
Platypus Espionage? Unraveling Side-Channel Attacks with Professor Gruss and Yossi Oren
What is it like to Research Microarchitecture? Uncovering the Shockingly Bizarre Rules!
How can we Mitigate Side-Channel Attacks?
Side Channel Attacks over the Internet! How do Hackers do that?
Side-channel Attacks with a Thermometer and Stopwatch?
Meta Data? Side-Channel Attacks!
Meta-Information Enables Side-Channel Attacks!
Why Would You Use Side-Channel Attacks?
Side-Channel Attacks: What Part of Microarchitecture is Your Favorite?
What are Side-Channel Attacks?
Hardware Leaks and Software Leaks - Spy on Keyboard Input in Chrome via the Page Cache - Episode 6.5
Power Leakers: Leaking Crypto Keys from Software using Power Side Channels -- Episode 6.4
Load Value Inception: Turning around Meltdown with Load Value Injection Attacks -- Episode 6.3
Under Voltage: How to Take Over Systems by Exploiting Undervolting Faults -- Episode 6.2
Sledge Hammer! - Trust Me, You Can Hijack Entire Systems with the Rowhammer Attack! -- Episode 6.1
Noise is just someone else's data - The ZombieLoad Attack can Leak Arbitrary Data -- Episode 5.5
Foreshadow - Leaking Secrets from Virtual Machines and SGX Enclaves -- Episode 5.4
Trust Issues -- How TEEs like SGX & TrustZone work, and their Security Properties -- Episode 5.3