ebook img

ARMageddon - blackhat.com PDF

268 Pages·2016·1.35 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview ARMageddon - blackhat.com

ARMageddon How Your Smartphone CPU Breaks Software-Level Security And Privacy Moritz Lipp and Cl´ementine Maurice November 3, 2016—Black Hat Europe • Information leaks because of the underlying hardware • We focus on the CPU cache • Cache attacks can be used for covert communications and attack crypto implementations • Only been demonstrated on Intel x86 for now • But why not on ARM? Motivation • Safe software infrastructure does not mean safe execution 2 • We focus on the CPU cache • Cache attacks can be used for covert communications and attack crypto implementations • Only been demonstrated on Intel x86 for now • But why not on ARM? Motivation • Safe software infrastructure does not mean safe execution • Information leaks because of the underlying hardware 2 • Cache attacks can be used for covert communications and attack crypto implementations • Only been demonstrated on Intel x86 for now • But why not on ARM? Motivation • Safe software infrastructure does not mean safe execution • Information leaks because of the underlying hardware • We focus on the CPU cache 2 • Only been demonstrated on Intel x86 for now • But why not on ARM? Motivation • Safe software infrastructure does not mean safe execution • Information leaks because of the underlying hardware • We focus on the CPU cache • Cache attacks can be used for covert communications and attack crypto implementations 2 • But why not on ARM? Motivation • Safe software infrastructure does not mean safe execution • Information leaks because of the underlying hardware • We focus on the CPU cache • Cache attacks can be used for covert communications and attack crypto implementations • Only been demonstrated on Intel x86 for now 2 Motivation • Safe software infrastructure does not mean safe execution • Information leaks because of the underlying hardware • We focus on the CPU cache • Cache attacks can be used for covert communications and attack crypto implementations • Only been demonstrated on Intel x86 for now • But why not on ARM? 2 Who We Are Who We Are • Moritz Lipp • Master Student, Graz University Of Technology • 7 @mlqxyz • R [email protected] 3 Who We Are • Cl´ementine Maurice • PhD in InfoSec; Postdoc, Graz University Of Technology • 7 @BloodyTangerine • R [email protected] 4

Description:
ARMageddon. How Your Smartphone CPU Breaks Software-Level. Security And Privacy. Moritz Lipp and Clémentine Maurice. November 3
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.