Поиск видео

Anders Fogh: Covert shotgun: Automatically finding covert channels in SMT

HD
1:5:58
автор  дата 12.01.2017
  • 2690
  • 31
  • 0
 Проголосовало пользователей: 31
In this talk I will be discuss covert channels in modern CPUs. Covert channels present a way for an attacker to exfiltrate information or build command and control functionality when the attacker and victim share the same computer, but are isolated in different security domains with communication either disabled or monitored. This situation is common in cloud computing as well as in personal computers through execution of downloaded code such as Java script. The talk will focus on finding covert channels in the pipeline of modern x86-64 CPU. Initially the talk will introduce the concept of covert channels and the confinement problem as defined by Lampson in 1973. A short discussion of how covert channels are usually found will be given. I’ll continue with showing how Simultaneous Multi-Threading (SMT) is implemented in the pipeline on Intel CPUs since Sandy Bridge and how this design gives rise to covert channels. Further we’ll discuss how and why I automated the search for covert channels with a tool called Covert Shotgun. The results from Covert Shotgun will be presented and placed in a larger perspective. == About the Speaker == Anders Fogh works as Principal Security Researcher at G-DATA Advanced Analytics GmbH. He has led numerous low level engineering efforts in the past 16 years. Since 1993 he has been an avid malware hobbyist and has reverse engineering experience with operating systems from DOS to present day OSs as well as devices ranging from DVD players to USB sticks Recently he has been researching the security implications of designs of CPUs and DRAM. He presented his work at Black Hat USA 2015 and 2016. He holds a master's degree in economics from the University of Aarhus.
ЕЩЁ
  • СКАЧАТЬ MP4
автор  дата 16.05.2017
Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power ...
  • СКАЧАТЬ MP4
автор  дата 23.02.2017
These guys figured out how to leverage a fundamental operational characteristic of all modern processor architecture to penetrate the randomization of all ...
  • СКАЧАТЬ MP4
автор  дата 04.04.2017
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel by Yago Hansen at the BSidesMunich 2017.
  • СКАЧАТЬ MP4
автор  дата 03.08.2015
Cyber security expert, Scott Schober visits WFXL-TV to demonstrate a hidden antenna to covertly detect illegal cell phones. Berkeley's President & CEO, Scott ...
  • СКАЧАТЬ MP4
автор  дата 10.04.2017
What is COVERT CHANNEL? What does COVERT CHANNEL mean? COVERT CHANNEL meaning - COVERT CHANNEL definition - COVERT CHANNEL ...
  • СКАЧАТЬ MP4
автор  дата 01.12.2016
In this talk, we will present our research into how the design of DRAM common to all computers and many other devices makes these computers and devices ...
  • СКАЧАТЬ MP4
автор  дата 19.01.2017
We've all been there - this one course at university where they tell you to actually read the log files, do proper incident response, and document everything.
  • СКАЧАТЬ MP4
автор  дата 30.12.2015
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters For Security by Nishad Herath & Anders Fogh CPU ...
  • СКАЧАТЬ MP4
In recent years, attacking air gapped networks through HID devices is becoming popular. The HID attack uses the USB interface to forge the user's keystrokes or ...
  • СКАЧАТЬ MP4
eko13 - 2017 - Andres Blanco - 802.11 Protocol Chaos Durante los últimos años, el estándar IEEE 802.11 para uso de conectividad inalámbrica se ha tornado ...
  • СКАЧАТЬ MP4
автор  дата 16.12.2011
A simple example of a covert channel via icmp.
  • СКАЧАТЬ MP4
автор  дата 07.06.2017
Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus on, how the micro architectural ...
  • СКАЧАТЬ MP4
автор  дата 19.03.2016
Covert channel presentation in NUS, Singapore.
  • СКАЧАТЬ MP4
In a casual conversation with Thomas “Halvar Flake” Dullien I suggested that performance counters could be used as a software mitigation for the row hammer ...
  • СКАЧАТЬ MP4
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks; Il-Gu Lee; Hyunwoo Choi; Yongdae Kim; ...
  • СКАЧАТЬ MP4
автор  дата 07.01.2018
Demonstration of the CloakifyFactory toolset developed by @TryCatchHCF - https://github.com/TryCatchHCF/Cloakify for data exfiltration, in order to bypass ...
  • СКАЧАТЬ MP4
автор  дата 22.11.2016
by Anders Fogh & Daniel Gruss Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus ...
  • СКАЧАТЬ MP4
автор  дата 28.08.2015
by Mark Seaborn, Halvar Flake "Rowhammer" is a problem with DRAM in which repeatedly accessing a row of memory can cause bit flips in adjacent rows.
  • СКАЧАТЬ MP4
TWERK
  Популярные тэги
      Сейчас смотрят

    У нас искали:


    Anders fogh: covert shotgun: automatically finding covert channels in smt How to fix error 1723 Modern techies How to make jungli name i'd! |2017 tricks| 18122008022 Браслет из резинок сердце ангела на рогатке 21112011036 How to make msp introsoutros using wondershare filmora! How to install wordpress on local server wamp or xampp | wordpress installation in urdu hindi Мехъер (свадьба) дагестан How to install fonts on windows 10 2018 How to download visual basic 6.0 for windows 7810 Passions s1e110 part 1 07052011027 Sec How to install mysql workbench on ubuntu How to embed facebook page events on squarespace Украина: разгул демократии. время покажет. выпуск от 24.05.2017 Супер айтыс толық нұсқа айбек калиев и бекарыс шойбеков нұр отан 15 жыл 02,11,14 hd Passions s1e124 part 2