Поиск видео

Anders Fogh: Covert shotgun: Automatically finding covert channels in SMT

HD
1:5:58
автор  дата 12.01.2017
  • 2806
  • 31
  • 0
 Проголосовало пользователей: 31
In this talk I will be discuss covert channels in modern CPUs. Covert channels present a way for an attacker to exfiltrate information or build command and control functionality when the attacker and victim share the same computer, but are isolated in different security domains with communication either disabled or monitored. This situation is common in cloud computing as well as in personal computers through execution of downloaded code such as Java script. The talk will focus on finding covert channels in the pipeline of modern x86-64 CPU. Initially the talk will introduce the concept of covert channels and the confinement problem as defined by Lampson in 1973. A short discussion of how covert channels are usually found will be given. I’ll continue with showing how Simultaneous Multi-Threading (SMT) is implemented in the pipeline on Intel CPUs since Sandy Bridge and how this design gives rise to covert channels. Further we’ll discuss how and why I automated the search for covert channels with a tool called Covert Shotgun. The results from Covert Shotgun will be presented and placed in a larger perspective. == About the Speaker == Anders Fogh works as Principal Security Researcher at G-DATA Advanced Analytics GmbH. He has led numerous low level engineering efforts in the past 16 years. Since 1993 he has been an avid malware hobbyist and has reverse engineering experience with operating systems from DOS to present day OSs as well as devices ranging from DVD players to USB sticks Recently he has been researching the security implications of designs of CPUs and DRAM. He presented his work at Black Hat USA 2015 and 2016. He holds a master's degree in economics from the University of Aarhus.
ЕЩЁ
  • СКАЧАТЬ MP4
автор  дата 10.04.2017
What is COVERT CHANNEL? What does COVERT CHANNEL mean? COVERT CHANNEL meaning - COVERT CHANNEL definition - COVERT CHANNEL ...
  • СКАЧАТЬ MP4
автор  дата 30.12.2015
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters For Security by Nishad Herath & Anders Fogh CPU ...
  • СКАЧАТЬ MP4
  • СКАЧАТЬ MP4
In a casual conversation with Thomas “Halvar Flake” Dullien I suggested that performance counters could be used as a software mitigation for the row hammer ...
  • СКАЧАТЬ MP4
автор  дата 16.12.2011
A simple example of a covert channel via icmp.
  • СКАЧАТЬ MP4
автор  дата 28.08.2015
by Mark Seaborn, Halvar Flake "Rowhammer" is a problem with DRAM in which repeatedly accessing a row of memory can cause bit flips in adjacent rows.
  • СКАЧАТЬ MP4
автор  дата 07.01.2018
Demonstration of the CloakifyFactory toolset developed by @TryCatchHCF - https://github.com/TryCatchHCF/Cloakify for data exfiltration, in order to bypass ...
  • СКАЧАТЬ MP4
автор  дата 20.10.2015
Interfacing Yosys and SMT Solvers for BMC and more using SMT-LIB 2.5 Bounded model checking and other SAT-based formal methods are an important part ...
  • СКАЧАТЬ MP4
автор  дата 20.05.2012
  • СКАЧАТЬ MP4
In recent years, attacking air gapped networks through HID devices is becoming popular. The HID attack uses the USB interface to forge the user's keystrokes or ...
  • СКАЧАТЬ MP4
eko13 - 2017 - Andres Blanco - 802.11 Protocol Chaos Durante los últimos años, el estándar IEEE 802.11 para uso de conectividad inalámbrica se ha tornado ...
  • СКАЧАТЬ MP4
автор  дата 19.01.2017
We've all been there - this one course at university where they tell you to actually read the log files, do proper incident response, and document everything.
  • СКАЧАТЬ MP4
автор  дата 16.05.2017
Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power ...
  • СКАЧАТЬ MP4
автор  дата 30.01.2018
  • СКАЧАТЬ MP4
автор  дата 27.07.2016
Separation logic (SL) has gained widespread popularity because of its ability to succinctly express complex invariants of a program's heap configurations.
  • СКАЧАТЬ MP4
автор  дата 16.10.2018
Anders Fogh Rasmussen, a former Danish prime minister and ex-secretary general for NATO, discusses the Trump administration's foreign policy stance.
  • СКАЧАТЬ MP4
автор  дата 04.04.2017
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel by Yago Hansen at the BSidesMunich 2017.
  • СКАЧАТЬ MP4
TWERK
  Популярные тэги
      Сейчас смотрят

    У нас искали:


    Anders fogh: covert shotgun: automatically finding covert channels in smt 14.09.2013 How to cook ratatouille 01.07.2018 How to make a custom thumbnail*iphone* Laine בחירות בארהב משדר חדשות מיוחד 08.11.2016 | כאן 11 לשעבר רשות השידור How to create a link shortener website [ part 2 ] Vampire ang daddy ko episode 2 part 13 См I dressed like k pop idol taehyung from bts for a day Ice cream finger family song | daddy finger rhyme Art africa photos sd 480p Horror part 7 Эстафетная Deleting my youtube channel if i lose. Tagesschau 20:00 uhr, 08.11.2016 Tech talk 11.10.2017 Минутный