Tag: side-channel
-
New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers
A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the audio gap and exfiltrating sensitive informat… First seen on thehackernews.com Jump to article: thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
-
New RAMBO attack steals data using RAM in air-gapped computers
A novel side-channel attack dubbed RAMBO (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device’s RAM to … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-rambo-attack-steals-data-using-ram-in-air-gapped-computers/
-
USENIX Security ’23 Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Authors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many th… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/usenix-security-23-collidepower-leaking-inaccessible-data-with-software-based-power-side-channels/
-
USENIX Security ’23 (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
Tags: side-channelAuthors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security ’23 … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/usenix-security-23-mwait-for-it-bridging-the-gap-between-microarchitectural-and-architectural-side-channels/
-
YubiKey 5 devices open to cloning via side-channel attacks
First seen on scmagazine.com Jump to article: www.scmagazine.com/news/yubikey-5-devices-open-to-cloning-via-side-channel-attacks
-
Yubikey: Cloning-Angriff über Seitenkanal
First seen on heise.de Jump to article: www.heise.de/news/Yubikey-Cloning-Angriff-Offenbar-moeglich-aber-nicht-trivial-9856972.html
-
Crypto Vulnerability Allows Cloning of YubiKey Security Keys
YubiKey security keys can be cloned via a side-channel attack that leverages a vulnerability in a cryptographic library. The post Crypto Vulnerability… First seen on securityweek.com Jump to article: www.securityweek.com/crypto-vulnerability-allows-cloning-of-yubikey-security-keys/
-
USENIX Security ’23 Checking Passwords On Leaky Computers: A Side Channel Analysis Of Chrome’s Password Leak Detect Protocol
Authors/Presenters:Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad Wahby, Yuval Yarom Many thank… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-checking-passwords-on-leaky-computers-a-side-channel-analysis-of-chromes-password-leak-detect-protocol/
-
USENIX Security ’23 CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Authors/Presenters:Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang Many thanks to USENIX for publishing their outstanding … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-cipherh-automated-detection-of-ciphertext-side-channel-vulnerabilities-in-cryptographic-implementations/
-
USENIX Security ’23 Pspray: Timing Side-Channel Based Linux Kernel Heap Exploitation Technique
Authors/Presenters:Yoochan Lee and Jinhan Kwak, Junesoo Kang, Yuseok Jeon, Byoungyoung Lee Many thanks to USENIX for publishing their outstanding USEN… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-pspray-timing-side-channel-based-linux-kernel-heap-exploitation-technique/
-
Researchers Found a New Technique to Defend Cache Side Channel Attacks
Researchers from the University of Rochester have unveiled a novel technique to defend against cache side-channel attacks, a prevalent threat in moder… First seen on gbhackers.com Jump to article: gbhackers.com/technique-channel-attacks/
-
USENIX Security ’23 Side-Channel Attacks on Optane Persistent Memory
Authors/Presenters:Sihang Liu, University of Virginia; Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Khan Many thanks to USE… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-side-channel-attacks-on-optane-persistent-memory/
-
USENIX Security ’23 Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software
Authors/Presenters:Jan Wichelmann, Anna Pätschke, Luca Wilke, Thomas Eisenbarth Many thanks to USENIX for publishing their outstanding USENIX Security… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-cipherfix-mitigating-ciphertext-side-channel-attacks-in-software/
-
USENIX Security ’23 NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
Authors/Presenters:Zixuan Wang, Mohammadkazem Taram, Daniel Moghimi, Steven Swanson, Dean Tullsen, Jishen Zhao Many thanks to USENIX for publishing th… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/usenix-security-23-nvleak-off-chip-side-channel-attacks-via-non-volatile-memory-systems/
-
New Intel CPU Vulnerability ‘Indirector’ Exposes Sensitive Data
Modern CPUs from Intel, including Raptor Lake and Alder Lake, have been found vulnerable to a new side-channel attack that could be exploited to leak … First seen on thehackernews.com Jump to article: thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html
-
New SnailLoad Attack Exploits Network Latency to Spy on Users’ Web Activities
A group of security researchers from the Graz University of Technology have demonstrated a new side-channel attack known as SnailLoad that could be us… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/new-snailload-attack-exploits-network.html
-
Intel dismisses reported side-channel vulnerability in CPU cores
First seen on scmagazine.com Jump to article: www.scmagazine.com/news/intel-dismisses-reported-side-channel-vulnerability-in-cpu-cores
-
Latest Intel CPUs impacted by new Indirector side-channel attack
Modern Intel processors, including chips from the Raptor Lake and the Alder Lake generations are susceptible to a new type of a high-precision Branch … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/latest-intel-cpus-impacted-by-new-indirector-side-channel-attack/
-
New SnailLoad side-channel attack detailed
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/new-snailload-side-channel-attack-detailed
-
New Spectre v2 attack impacts Linux systems on Intel CPUs
Researchers have demonstrated the first native Spectre v2 exploit for a new speculative execution side-channel flaw that impacts Linux systems running… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-spectre-v2-attack-impacts-linux-systems-on-intel-cpus/
-
GoFetch side-channel attack against Apple systems allows secret keys extraction
Researchers demonstrated a new side-channel attack, named GoFetch, against Apple CPUs that could allow an attacker to obtain secret keys. A team of re… First seen on securityaffairs.com Jump to article: securityaffairs.com/160993/hacking/gofetch-side-channel-attack-apple.html
-
Cryptographic key theft likely with new side-channel attack against Apple chips
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/cryptographic-key-theft-likely-with-new-side-channel-attack-against-apple-chips
-
GoFetch: Seitenkanal-Angriff auf Apple-Chips gefährdet Krypto-Schlüssel
Prozessoren aus Apples eigener Fertigung sind anfällig für einen Angriff auf deren Optimierungsfunktionen. Den Fehler zu beheben, wird wohl Performanc… First seen on heise.de Jump to article: www.heise.de/news/GoFetch-Seitenkanal-Angriff-auf-Apple-Chips-gefaehrdet-Krypto-Schluessel-9662943.html
-
New GoFetch attack on Apple Silicon CPUs can steal crypto keys
A new side-channel attack called GoFetch impacts Apple M1, M2, and M3 processors and can be used to steal secret cryptographic keys from data in the C… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-gofetch-attack-on-apple-silicon-cpus-can-steal-crypto-keys/
-
GoFetch Side-Channel Attack Impact Apple CPUs: Attackers Steal Secret Keys
Researchers have unveiled a new class of microarchitectural side-channel attacks that pose a severe threat to the security of Apple CPUs. The attack, … First seen on gbhackers.com Jump to article: gbhackers.com/gofetch-side-channel-attack/
-
New ‘GoFetch’ Apple CPU Attack Exposes Crypto Keys
Researchers detail GoFetch, a new side-channel attack impacting Apple CPUs that could allow an attacker to obtain secret keys. The post ers detail GoF… First seen on securityweek.com Jump to article: www.securityweek.com/new-gofetch-apple-cpu-attack-exposes-crypto-keys/
-
New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data
In recent years, personal data security has surged in importance due to digital device usage. Side-channel attacks exploit system side effects to gath… First seen on gbhackers.com Jump to article: gbhackers.com/acoustic-keyboard-attack-data-theft/
-
New Attack Shows Risks of Browsers Giving Websites Access to GPU
Researchers demonstrate remote GPU cache side-channel attack from within browsers against AMD and NVIDIA graphics cards. The post ers demonstrate remo… First seen on securityweek.com Jump to article: www.securityweek.com/new-attack-shows-risks-of-browsers-giving-websites-access-to-gpu/
-
New acoustic attack determines keystrokes from typing patterns
Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-acoustic-attack-determines-keystrokes-from-typing-patterns/
-
Side Channel In Most AI Assistants Lets Hackers Read Encrypted Chats
First seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/35651/Side-Channel-In-Most-AI-Assistants-Lets-Hackers-Read-Encrypted-Chats.html

