profile picture

side channel, attacks

Side Channel Attacks

This work briefly discusses some methods that I consider critical for the security of today’s computing systems. For a better understanding of the discussion proposed here, the excerpt is divided into two sections. In the first section we will discuss what a side channel attack is, how they arise, their scope, and why it is so difficult to mitigate side channel attacks. We present the principles behind attack methods and show that, for the most part, they are intrinsic to the system architecture of the system.

Read more...

Subscribe to my newsletter