-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnotes
21 lines (13 loc) · 1.63 KB
/
notes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Cache attack — attacks based on attacker's ability to monitor cache accesses made by the victim in a shared physical system as in virtualized environment or a type of cloud service.
Timing attack — attacks based on measuring how much time various computations (such as, say, comparing an attacker's given password with the victim's unknown one) take to perform.
Generate random noise before,during,after read/write operations.
Power-monitoring attack — attacks that make use of varying power consumption by the hardware during computation.
Generate random noise before,during,after read/write operations.
Electromagnetic attack — attacks based on leaked electromagnetic radiation, which can directly provide plaintexts and other information. Such measurements can be used to infer cryptographic keys using techniques equivalent to those in power analysis or can be used in non-cryptographic attacks, e.g. TEMPEST (aka van Eck phreaking or radiation monitoring) attacks.
Generate random noise before,during,after read/write operations.
Acoustic cryptanalysis — attacks that exploit sound produced during a computation (rather like power analysis).
Differential fault analysis — in which secrets are discovered by introducing faults in a computation.
Data remanence — in which sensitive data are read after supposedly having been deleted. (e.g. Cold boot attack)
Erasure when not needed
Encryption with key held in TPM
Software-initiated fault attacks — Currently a rare class of side channels, Row hammer is an example in which off-limits memory can be changed by accessing adjacent memory too often (causing state retention loss).