Submit Search
Upload
Side channel attacks
•
Download as ODP, PDF
•
4 likes
•
3,348 views
Stefan Fodor
Follow
second presentation on IT Security.
Read less
Read more
News & Politics
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
Session Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Password craking techniques
Password craking techniques
أحلام انصارى
Intruders
Intruders
techn
12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Ip spoofing ppt
Ip spoofing ppt
Anushakp9
Network attacks
Network attacks
Manjushree Mashal
Recommended
Session Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Password craking techniques
Password craking techniques
أحلام انصارى
Intruders
Intruders
techn
12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Ip spoofing ppt
Ip spoofing ppt
Anushakp9
Network attacks
Network attacks
Manjushree Mashal
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Social engineering attacks
Social engineering attacks
Ramiro Cid
IP Spoofing
IP Spoofing
Akmal Hussain
Botnet Detection Techniques
Botnet Detection Techniques
Team Firefly
Intrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
Web security
Web security
kareem zock
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Ethical hacking ppt
Ethical hacking ppt
himanshujoshi238
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
Intrusion detection system
Intrusion detection system
Aparna Bhadran
Brute force attack
Brute force attack
Jamil Ali Ahmed
Web Security
Web Security
Bharath Manoharan
Man in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
Ch03
Ch03
Joe Christensen
Cryptography
Cryptography
Shivanand Arur
Wired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
Mobile computing security
Mobile computing security
Zachariah Pabi
Buffer overflow attacks
Buffer overflow attacks
Joe McCarthy
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
More Related Content
What's hot
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Social engineering attacks
Social engineering attacks
Ramiro Cid
IP Spoofing
IP Spoofing
Akmal Hussain
Botnet Detection Techniques
Botnet Detection Techniques
Team Firefly
Intrusion Detection Presentation
Intrusion Detection Presentation
Mustafash79
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
Web security
Web security
kareem zock
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Ethical hacking ppt
Ethical hacking ppt
himanshujoshi238
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
Intrusion detection system
Intrusion detection system
Aparna Bhadran
Brute force attack
Brute force attack
Jamil Ali Ahmed
Web Security
Web Security
Bharath Manoharan
Man in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
Ch03
Ch03
Joe Christensen
Cryptography
Cryptography
Shivanand Arur
Wired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
Mobile computing security
Mobile computing security
Zachariah Pabi
Buffer overflow attacks
Buffer overflow attacks
Joe McCarthy
What's hot
(20)
Network security & cryptography full notes
Network security & cryptography full notes
Social engineering attacks
Social engineering attacks
IP Spoofing
IP Spoofing
Botnet Detection Techniques
Botnet Detection Techniques
Intrusion Detection Presentation
Intrusion Detection Presentation
RC4&RC5
RC4&RC5
Web security
Web security
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Ethical hacking ppt
Ethical hacking ppt
Block Cipher and its Design Principles
Block Cipher and its Design Principles
Secure Hash Algorithm
Secure Hash Algorithm
Intrusion detection system
Intrusion detection system
Brute force attack
Brute force attack
Web Security
Web Security
Man in The Middle Attack
Man in The Middle Attack
Ch03
Ch03
Cryptography
Cryptography
Wired and Wireless Network Forensics
Wired and Wireless Network Forensics
Mobile computing security
Mobile computing security
Buffer overflow attacks
Buffer overflow attacks
Similar to Side channel attacks
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
01-intro-thompson.ppt
01-intro-thompson.ppt
MarcoAntonioSotoVera
01-intro-thompson.ppt
01-intro-thompson.ppt
ROHITCHHOKER3
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
RamithaDevi
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
rishabhawasthi0365
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
Introduction to security
Introduction to security
Mostafa Elgamala
Dc 11 Brucepotter
Dc 11 Brucepotter
Object-Frontier Software Pvt. Ltd
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
IS Security Presentation
IS Security Presentation
Renjith K P
Similar to Side channel attacks
(13)
01-intro-thompson.ppt
01-intro-thompson.ppt
Computer and Network Security
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Introduction to security
Introduction to security
Dc 11 Brucepotter
Dc 11 Brucepotter
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
IS Security Presentation
IS Security Presentation
More from Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
Risk assesment IT Security project
Risk assesment IT Security project
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
More from Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
Risk assesment IT Security project
Risk assesment IT Security project
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Recently uploaded
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
FIRST INDIA
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
Ismail Fahmi
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Pooja Nehwal
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
narsireddynannuri1
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
FIRST INDIA
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
kfjstone13
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
Awaiskhalid96
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
kfjstone13
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Muhammad Shamsaddin Megalommatis
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
KISHAN REDDY OFFICE
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
Lorenzo Lemes
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
Krish109503
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
AlexisTorres963861
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
johnandrewcarlos
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Axel Bruns
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
Fi L
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
SABC News
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
FIRST INDIA
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
Ismail Fahmi
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
anjanibaddipudi1
Recently uploaded
(20)
25042024_First India Newspaper Jaipur.pdf
25042024_First India Newspaper Jaipur.pdf
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
29042024_First India Newspaper Jaipur.pdf
29042024_First India Newspaper Jaipur.pdf
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Beyond Afrocentrism: Prerequisites for Somalia to lead African de-colonizatio...
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
Dynamics of Destructive Polarisation in Mainstream and Social Media: The Case...
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
Different Frontiers of Social Media War in Indonesia Elections 2024
Different Frontiers of Social Media War in Indonesia Elections 2024
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
Side channel attacks
1.
Side-Channel Attacks
Stefan FODOR(backb0ne fl00d3r ) 1 day before June 'couse the true 1337 hax0rs don't care about vulnerabilities
2.
3.
Classes of side
channel attack
4.
Examples
5.
Countermeasures
6.
Questions?
7.
8.
9.
10.
11.
Power monitoring attacks
12.
Electromagnetic attacks
13.
Acoustic cryptoanalysis
14.
Differential fault analysis
15.
16.
Apache + mod_SSL
17.
Compared time needed
to decrypting multiple requests
18.
They deduced multiple
1024 bit private-key
19.
20.
Bad : recovered
96% of the text based on audio
21.
Worse : 69%
of all 10 random character password
22.
Worst : works
on ATMs, too
23.
24.
Monitor the electromagnetic
field of the smart-phone performing encryptions
25.
Deduces the encryption
key
26.
27.
Recover the disk
encryption key
28.
… after freezing
the RAM Memory
29.
Released in July
2008, still no decent remedy
30.
31.
Questions?
32.
33.
http://en.wikipedia.org/wiki/Side_channel_attack
34.
http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml
35.
http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf
36.
http://citp.princeton.edu/memory/
37.
http://www.youtube.com/watch?v=4L8rnYhnLt8
Editor's Notes
Not to be confused with social engineering
* 2 guys from Stanford University * timming usualy performed on smartcard reader * a lot of math and graphs
* Each key sounds different * University of Berkeley * September 2005 * use of statistics: the more likely then tjw
* March 2011 * works from 2 meters away
Cache as RAM
Download now