⚡ Breaking "Perfect" Security with Timing Attacks - grhkm

Published on ● Video Link: https://www.youtube.com/watch?v=OC5D6DD1-_w



Duration: 13:33
3,415 views
120


Just because a computer system is cryptographically secure, doesn't mean we can't break it in other ways. This talk introduces and explores timing attacks and more generally side-channel attacks, on real world examples. While usually easy to fix, they can be subtle to spot, and lead to critical vulnerabilities if not properly considered when writing secure code.

Talk by grhkm ( https://grhkm21.github.io/ )

Links:
https://nvd.nist.gov/vuln/detail/CVE-2019-18887
https://mystiz.hk/posts/2021/2021-11-27-balsn-dlog/
https://www.usenix.org/conference/usenixsecurity20/presentation/van-goethem

00:00 - Introduction
00:43 - "Perfect" Code
02:38 - First Timing Attack
03:56 - Case Study: Symfony
06:50 - Case Study: RSA
09:28 - Timeless Timing Attacks
12:21 - Conclusion







Tags:
computing
uwcs
university
society
coding
programming
crypto
cryptography
hashing
RSA
timing attacks
side channel attacks
breaking RSA
computer security
security vulnerability
computer science