C3Subtitles: rc3: Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)
back

Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:59:16
Language
English
Abstract
Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: "Warum leaked hier Strom?" (Why is power leaking here?).

In this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.

Talk ID
11404
Event:
rc3
Day
2
Room
rC2
Start
7:20 p.m.
Duration
01:00:00
Track
IT-Security
Type of
lecture
Speaker
Andreas Kogler
Daniel Gruss
Michael Schwarz
Moritz Lipp
Talk Slug & media link
rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
3.4% Transcribing done3.4%
96.6% Nothing done yet96.6%

English: Transcribed until

Last revision: 6 months ago