Tag: side-channel
-
With ‘TPUXtract,’ Attackers Can Steal Orgs’ AI Models
by
in SecurityNewsA new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network, meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/tpuxtract-attackers-steal-ai-models
-
BadRAM: Historischer Seitenkanal hebelt RAM-Verschlüsselung aus
by
in SecurityNewsServer schützen Daten mit komplexen Funktionen für Confidential Computing, die sich durch Speicherriegel mit gefälschter Konfiguration austricksen lassen. First seen on heise.de Jump to article: www.heise.de/news/BadRAM-Historischer-Seitenkanal-hebelt-Confidential-Computing-in-der-Cloud-aus-10193941.html
-
Sicherheitslücke WebGPU: Rechnerzugriff über Seitenkanal-Angriffe auf Grafikkarte
by
in SecurityNewsDieses Forschungsprojekt ist im Field of Expertise ‘Information, Communication & Computing verankert, einem von fünf strategischen Schwerpunktfeldern … First seen on infopoint-security.de Jump to article: www.infopoint-security.de/sicherheitsluecke-webgpu-rechnerzugriff-ueber-seitenkanal-angriffe-auf-grafikkarte/a37063/
-
Yubikey-Seitenkanal: Weitere Produkte für Cloning-Attacke anfällig
by
in SecurityNewsDie Seitenkanal-Lücke EUCLEAK wurde auch als “Yubikey-Cloning-Attacke” bekannt. Das BSI re-zertifiziert aktualisierte Produkte, die betroffen waren. First seen on heise.de Jump to article: www.heise.de/news/EUCLEAK-Weitere-Produkte-fuer-Cloning-Attacke-anfaellig-10078520.html
-
EUCLEAK: Weitere Produkte für Cloning-Attacke anfällig
by
in SecurityNewsDie Seitenkanal-Lücke EUCLEAK wurde auch als “Yubikey-Cloning-Attacke” bekannt. Das BSI re-zertifiziert aktualisierte Produkte, die betroffen waren. First seen on heise.de Jump to article: www.heise.de/news/EUCLEAK-Weitere-Produkte-fuer-Cloning-Attacke-anfaellig-10078520.html
-
DEF CON 32 Your AI Assistant Has A Big Mouth: A New Side Channel Attack
by
in SecurityNewsAuthors/Presenters: Yisroel Mirsky Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-your-ai-assistant-has-a-big-mouth-a-new-side-channel-attack/
-
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel
by
in SecurityNewsFirst seen on arstechnica.com Jump to article: arstechnica.com/
-
New PIXHELL Attack Exploits LCD Screen Noise to Exfiltrate Data from Air-Gapped Computers
by
in SecurityNewsA new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the audio gap and exfiltrating sensitive informat… First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
-
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
by
in SecurityNewsA novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory (RAM) as a data exfiltration mechanis… First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html
-
Eucleak: YubiKey-Lücke ermöglicht Side-Channel-Attacken
by
in SecurityNews
Tags: side-channelFirst seen on csoonline.com Jump to article: www.csoonline.com/de/a/yubikey-luecke-ermoeglicht-side-channel-attacken
-
RAM Signals Expose Air-Gapped Networks to Attacks
by
in SecurityNewsRAM-Based Radio Signal Attack Allows Attackers to Exfiltrate Data. A novel side-channel attack exploits radio signals emitted by random access memory … First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ram-signals-expose-air-gapped-networks-to-attacks-a-26258
-
New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers
by
in SecurityNewsA new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the audio gap and exfiltrating sensitive informat… First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
-
New RAMBO attack steals data using RAM in air-gapped computers
by
in SecurityNewsA novel side-channel attack dubbed RAMBO (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device’s RAM to … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-rambo-attack-steals-data-using-ram-in-air-gapped-computers/
-
USENIX Security ’23 Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
by
in SecurityNewsAuthors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many th… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/usenix-security-23-collidepower-leaking-inaccessible-data-with-software-based-power-side-channels/
-
USENIX Security ’23 (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
by
in SecurityNews
Tags: side-channelAuthors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security ’23 … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/usenix-security-23-mwait-for-it-bridging-the-gap-between-microarchitectural-and-architectural-side-channels/
-
YubiKey 5 devices open to cloning via side-channel attacks
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/yubikey-5-devices-open-to-cloning-via-side-channel-attacks
-
Yubikey: Cloning-Angriff über Seitenkanal
by
in SecurityNewsFirst seen on heise.de Jump to article: www.heise.de/news/Yubikey-Cloning-Angriff-Offenbar-moeglich-aber-nicht-trivial-9856972.html
-
Crypto Vulnerability Allows Cloning of YubiKey Security Keys
by
in SecurityNewsYubiKey security keys can be cloned via a side-channel attack that leverages a vulnerability in a cryptographic library. The post Crypto Vulnerability… First seen on securityweek.com Jump to article: www.securityweek.com/crypto-vulnerability-allows-cloning-of-yubikey-security-keys/
-
USENIX Security ’23 Checking Passwords On Leaky Computers: A Side Channel Analysis Of Chrome’s Password Leak Detect Protocol
by
in SecurityNewsAuthors/Presenters:Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, Yuval Yarom Many thank… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-checking-passwords-on-leaky-computers-a-side-channel-analysis-of-chromes-password-leak-detect-protocol/
-
USENIX Security ’23 CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
by
in SecurityNewsAuthors/Presenters:Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang Many thanks to USENIX for publishing their outstanding … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-cipherh-automated-detection-of-ciphertext-side-channel-vulnerabilities-in-cryptographic-implementations/
-
USENIX Security ’23 Pspray: Timing Side-Channel Based Linux Kernel Heap Exploitation Technique
by
in SecurityNewsAuthors/Presenters:Yoochan Lee and Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee Many thanks to USENIX for publishing their outstanding USEN… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-pspray-timing-side-channel-based-linux-kernel-heap-exploitation-technique/
-
Researchers Found a New Technique to Defend Cache Side Channel Attacks
by
in SecurityNewsResearchers from the University of Rochester have unveiled a novel technique to defend against cache side-channel attacks, a prevalent threat in moder… First seen on gbhackers.com Jump to article: gbhackers.com/technique-channel-attacks/
-
USENIX Security ’23 Side-Channel Attacks on Optane Persistent Memory
by
in SecurityNewsAuthors/Presenters:Sihang Liu, University of Virginia; Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan Many thanks to USE… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-side-channel-attacks-on-optane-persistent-memory/
-
USENIX Security ’23 Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
by
in SecurityNewsAuthors/Presenters:Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth Many thanks to USENIX for publishing their outstanding USENIX Security… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-cipherfix-mitigating-ciphertext-side-channel-attacks-in-software/
-
USENIX Security ’23 NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
by
in SecurityNewsAuthors/Presenters:Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao Many thanks to USENIX for publishing th… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-nvleak-off-chip-side-channel-attacks-via-non-volatile-memory-systems/
-
New Intel CPU Vulnerability ‘Indirector’ Exposes Sensitive Data
by
in SecurityNewsModern CPUs from Intel, including Raptor Lake and Alder Lake, have been found vulnerable to a new side-channel attack that could be exploited to leak … First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
-
New SnailLoad Attack Exploits Network Latency to Spy on Users’ Web Activities
by
in SecurityNewsA group of security researchers from the Graz University of Technology have demonstrated a new side-channel attack known as SnailLoad that could be us… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
-
Intel dismisses reported side-channel vulnerability in CPU cores
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/intel-dismisses-reported-side-channel-vulnerability-in-cpu-cores
-
Latest Intel CPUs impacted by new Indirector side-channel attack
by
in SecurityNewsModern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/latest-intel-cpus-impacted-by-new-indirector-side-channel-attack/
-
New SnailLoad side-channel attack detailed
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/new-snailload-side-channel-attack-detailed