“Previous software-based power side-channels attacks like PLATYPUS and Hertzbleed target cryptographic algorithms and needed precise knowledge of the algorithm or victim program executed on the target machine. In contrast, Collide+Power targets the CPU memory subsystem, which abstracts the precise implementation away as all programs require the memory subsystem in some way. Furthermore, any signal reflecting the power consumption can be used due to the fundamental physical power leakage exploited by Collide+Power.”

https://packetstormsecurity.com/news/view/34858/Nearly-All-Modern-CPUs-Leak-Data-To-New-Collide-Power-Side-Channel-Attack.html

#sidechannelattack

Reply to this note

Please Login to reply.

Discussion

No replies yet.