back

Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:59:16
Language
English
Abstract
Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: "Warum leaked hier Strom?" (Why is power leaking here?).

In this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.

Talk ID
11404
Event:
rc3
Day
2
Room
rC2
Start
7:20 p.m.
Duration
01:00:00
Track
IT-Security
Type of
lecture
Speaker
Daniel Gruss
Moritz Lipp
Michael Schwarz
Andreas Kogler
Talk Slug & media link
rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en

Talk & Speaker speed statistics

Very rough underestimation:
140.7 wpm
779.1 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

Talk & Speaker speed statistics with word clouds

Whole talk:
140.7 wpm
779.1 spm
moritzpowerkeymichaelconsumptionandreasbitinstructionenergytimecpuattackkernelbasicallyexactlyworkintelinstructionsattacksaccesssystemsinglesquareinstanceraplthingstepjoamdcourseworksmultiplymodelsgx-stepquestiontalksidepapertargetbitsdatameasurementmeasureenclaveexecuteniceinterfaceoperatingcasegreat