LANtenna hack spies on your data from across the room! (Sort of)
Are your network cables acting as undercover wireless transmitters? What can you do if they are? Continue reading LANtenna hack spies on your data from across the room! (Sort of)
Collaborate Disseminate
Are your network cables acting as undercover wireless transmitters? What can you do if they are? Continue reading LANtenna hack spies on your data from across the room! (Sort of)
I’m a student of computer architecture and I just got through a class on Hardware Security.
We spent a considerable amount of time learning about microarchitectural side channels, reading papers on how researchers "stole" cryptog… Continue reading Has hackers ever used a microarchitectural side channel to launch an attack?
I am trying to find the differences between a covert timing channel and a covert storage channel in terms of detectability, performance, features, and any other advantages and disadvantages.
Is there any resource that directly compares t… Continue reading What are the main differences between a covert timing channel and a covert storage channel?
[Ryan Flowers] writes in with a clever little hack that can allow you to hide data where nobody is going to go looking for it. By exploiting the fact that a web server will generally log all HTTP requests whether or not it’s valid, he shows how you can covertly …read more
Continue reading Secret Messages Could be Hiding in Your Server Logs
The attack allows snooping of data from environments that are highly secure or air-gapped, using infrared signals from smart bulbs. Continue reading Researchers Shine Light on Smart-Bulb Data Theft
In a report on an open-source separation kernel (Muen kernel) I was reading, in the future work section, it says that cache coloring can be implemented to prevent covert/side-channel attacks.
It is mentioned that
In a se… Continue reading How does cache partitioning prevent covert/side-channel attacks?
Considering the scenario when the attacker is able to exfiltrate sensitive data from compromised system to external network or Internet, but there are only limited ways to achieve this because the outbound connection is confi… Continue reading What is good metric for detecting data exfiltration on covert channel?
Considering the scenario when the attacker is able to exfiltrate sensitive data from compromised system to external network or Internet, but there are only limited ways to achieve this because the outbound connection is confi… Continue reading What is good metric for detecting data exfiltration on covert channel?
It is incredibly interesting how many parts of a computer system are capable of leaking data in ways that is hard to imaging. Part of securing highly sensitive locations involves securing the computers and networks used in those facilities in order to prevent this. These IT security policies and practices have been evolving and tightening through the years, as malicious actors increasingly target vital infrastructure.
Sometimes, when implementing strong security measures on a vital computer system, a technique called air-gapping is used. Air-gapping is a measure or set of measures to ensure a secure computer is physically isolated from unsecured …read more
Continue reading Hacking the Aether: How Data Crosses the Air-Gap
“DiskFiltration” siphons data even when computers are disconnected from the Internet. Continue reading New air-gap jumper covertly transmits data in hard-drive sounds