How can a timing/cache side-channel attack be performed? How can attack know the time of which certain instructions are performed by the victim?

About timing my question is:
How can attack know the time of which certain instructions are performed by the victim?
And about the cache, how can attacker know which cache line is being accessed by the victim? Is this doable in "norma… Continue reading How can a timing/cache side-channel attack be performed? How can attack know the time of which certain instructions are performed by the victim?

Are timing-based side-channel attacks against the server during CORS preflight a legitimate concern?

Section 3.2.3 of the Fetch standard provides some guidance about how servers can/should handle preflight requests.

A successful HTTP response, i.e., one where the server developer intends to share it, to a CORS request can use any status,… Continue reading Are timing-based side-channel attacks against the server during CORS preflight a legitimate concern?

How can differential power analysis (DPA) still work without "sufficient" measurement resolution?

Referring to Introduction to differential power analysis (Paul Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi)

[…]
Because the amount of power used by a device is influenced by the data being processed, power consumption measurement… Continue reading How can differential power analysis (DPA) still work without "sufficient" measurement resolution?

What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the user to enter). One possibility I can thi… Continue reading What type of attacks can be carried against an OS with FDE, if we assume OS and FDE are implemented correctly?

Books You Should Read: The Hardware Hacker’s Handbook

Here on Hackaday, we routinely cover wonderful informative writeups on different areas of hardware hacking, and we even have our own university with courses that delve into topics one by …read more Continue reading Books You Should Read: The Hardware Hacker’s Handbook