Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé side-channel  ✕
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/
05/09/2024 06:51:41
QRCode
archive.org
thumbnail

Sophisticated attack breaks security assurances of the most popular FIDO key.
The YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard, contains a cryptographic flaw that makes the finger-size device vulnerable to cloning when an attacker gains temporary physical access to it, researchers said Tuesday.

The cryptographic flaw, known as a side channel, resides in a small microcontroller used in a large number of other authentication devices, including smartcards used in banking, electronic passports, and the accessing of secure areas. While the researchers have confirmed all YubiKey 5 series models can be cloned, they haven’t tested other devices using the microcontroller, such as the SLE78 made by Infineon and successor microcontrollers known as the Infineon Optiga Trust M and the Infineon Optiga TPM. The researchers suspect that any device using any of these three microcontrollers and the Infineon cryptographic library contains the same vulnerability.

arstechnica EN 2024 YubiKeys FIDO cloning side-channel
New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities https://thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
30/06/2024 11:41:28
QRCode
archive.org
thumbnail

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

thehackernews EN 2024 SnailLoad Attack side-channel attack network latency
Unpatchable vulnerability in Apple chip leaks secret encryption keys https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/
21/03/2024 16:50:21
QRCode
archive.org
thumbnail

Fixing newly discovered side channel will likely take a major toll on performance.

arstechnica EN 2024 gofetch Side-Channel encryption keys
iLeakage https://ileakage.com/
25/10/2023 23:45:04
QRCode
archive.org

We present iLeakage, a transient execution side channel targeting the Safari web browser present on Macs, iPads and iPhones. iLeakage shows that the Spectre attack is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery. We show how an attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution. In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content. Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.

ileakage EN 2023 macos Safari Side-Channel ios Spectre speculative
New GPU Side-Channel Attack Allows Malicious Websites to Steal Data https://www.securityweek.com/new-gpu-side-channel-attack-allows-malicious-websites-to-steal-data/
27/09/2023 19:25:15
QRCode
archive.org
thumbnail

GPUs from AMD, Apple, Arm, Intel, Nvidia and Qualcomm are vulnerable to a new type of side-channel attack named GPU.zip.

securityweek EN 2023 GPU.zip Side-Channel Attack
GPU.zip https://www.hertzbleed.com/gpu.zip/
27/09/2023 19:23:47
QRCode
archive.org

On the Side-Channel Implications of Hardware-Based Graphical Data Compression

hertzbleed EN 2023 vulnerability Side-Channel Graphical-Data-Compression GPU.zip
A New Attack Can Unmask Anonymous Users on Any Major Browser https://www.wired.com/story/web-deanonymization-side-channel-attack-njit/
14/07/2022 21:03:17
QRCode
archive.org
thumbnail

Researchers have found a way to use the web's basic functions to identify who visits a site—without the user detecting the hack.

Wired EN 2022 browsers browser vulnerabilities hacking identify attack side-channel
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/
15/06/2022 06:54:19
QRCode
archive.org
thumbnail

Hertzbleed attack targets power-conservation feature found on virtually all modern CPUs.

arstechnica 2022 EN Microprocessors Hertzbleed power-conservation AMD Intel DVFS x86 side-channel attack keys vulnerabilies
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio