Поиск видео

Anders Fogh: Covert shotgun: Automatically finding covert channels in SMT

HD
1:5:58
автор  дата 12.01.2017
  • 2744
  • 31
  • 0
 Проголосовало пользователей: 31
In this talk I will be discuss covert channels in modern CPUs. Covert channels present a way for an attacker to exfiltrate information or build command and control functionality when the attacker and victim share the same computer, but are isolated in different security domains with communication either disabled or monitored. This situation is common in cloud computing as well as in personal computers through execution of downloaded code such as Java script. The talk will focus on finding covert channels in the pipeline of modern x86-64 CPU. Initially the talk will introduce the concept of covert channels and the confinement problem as defined by Lampson in 1973. A short discussion of how covert channels are usually found will be given. I’ll continue with showing how Simultaneous Multi-Threading (SMT) is implemented in the pipeline on Intel CPUs since Sandy Bridge and how this design gives rise to covert channels. Further we’ll discuss how and why I automated the search for covert channels with a tool called Covert Shotgun. The results from Covert Shotgun will be presented and placed in a larger perspective. == About the Speaker == Anders Fogh works as Principal Security Researcher at G-DATA Advanced Analytics GmbH. He has led numerous low level engineering efforts in the past 16 years. Since 1993 he has been an avid malware hobbyist and has reverse engineering experience with operating systems from DOS to present day OSs as well as devices ranging from DVD players to USB sticks Recently he has been researching the security implications of designs of CPUs and DRAM. He presented his work at Black Hat USA 2015 and 2016. He holds a master's degree in economics from the University of Aarhus.
ЕЩЁ
  • СКАЧАТЬ MP4
автор  дата 23.02.2017
These guys figured out how to leverage a fundamental operational characteristic of all modern processor architecture to penetrate the randomization of all ...
  • СКАЧАТЬ MP4
автор  дата 19.03.2016
Covert channel presentation in NUS, Singapore.
  • СКАЧАТЬ MP4
автор  дата 19.01.2017
We've all been there - this one course at university where they tell you to actually read the log files, do proper incident response, and document everything.
  • СКАЧАТЬ MP4
UCGA Club Breakfast with Anders Fogh Rasmussen Mr. Rasmussen talked about 4 principles of determined leadership in global, political or corporate ...
  • СКАЧАТЬ MP4
автор  дата 07.05.2017
Den tidligere danske statsminister mener, at der er en afstand mellem de franske politikere og befolkningen. Læs historien her: ...
  • СКАЧАТЬ MP4
автор  дата 07.06.2017
Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus on, how the micro architectural ...
  • СКАЧАТЬ MP4
автор  дата 06.09.2018
Quickfire questioning: what does Anders Fogh Rasmussen think of Macron, Merkel and the rest… READ MORE ...
  • СКАЧАТЬ MP4
автор  дата 04.04.2017
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel by Yago Hansen at the BSidesMunich 2017.
  • СКАЧАТЬ MP4
автор  дата 07.01.2018
Demonstration of the CloakifyFactory toolset developed by @TryCatchHCF - https://github.com/TryCatchHCF/Cloakify for data exfiltration, in order to bypass ...
  • СКАЧАТЬ MP4
In recent years, attacking air gapped networks through HID devices is becoming popular. The HID attack uses the USB interface to forge the user's keystrokes or ...
  • СКАЧАТЬ MP4
автор  дата 16.12.2011
A simple example of a covert channel via icmp.
  • СКАЧАТЬ MP4
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures Roberto Guanciale (KTH) Presented at the 2016 IEEE Symposium on Security ...
  • СКАЧАТЬ MP4
автор  дата 28.08.2015
by Mark Seaborn, Halvar Flake "Rowhammer" is a problem with DRAM in which repeatedly accessing a row of memory can cause bit flips in adjacent rows.
  • СКАЧАТЬ MP4
In a casual conversation with Thomas “Halvar Flake” Dullien I suggested that performance counters could be used as a software mitigation for the row hammer ...
  • СКАЧАТЬ MP4
автор  дата 30.12.2015
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters For Security by Nishad Herath & Anders Fogh CPU ...
  • СКАЧАТЬ MP4
автор  дата 10.04.2017
What is COVERT CHANNEL? What does COVERT CHANNEL mean? COVERT CHANNEL meaning - COVERT CHANNEL definition - COVERT CHANNEL ...
  • СКАЧАТЬ MP4
автор  дата 16.05.2017
Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power ...
  • СКАЧАТЬ MP4
TWERK
  Популярные тэги
      Сейчас смотрят

    У нас искали:


    Anders fogh: covert shotgun: automatically finding covert channels in smt Миллиардтаған Mubarizeen Adam patel (asep (izuku x listener) ||| anime rp ||| “izuku wants to be a hero” Kizomba hipster Rəşid mahmudov mübariz ibrahimovu təhqir edən psixoloqa La tarde de ntn24 viernes 1 de febrero de 2019 14190011 Presstv kazanlak Relajarme! Omarr thomas Псих на улице пранк Vitamin club 03 avtoshqert chstacvac kadrer Fuel door emergency release, volvo s80, s60, v70, s40, xc90, etc. auto repair series ქართული ჯარის დღე მაესტრო 30.04.2017 Kolangal episode 159 Smd skk America a horse with no name (beatzkrieg remix)