Чтобы начать поиск, пожалуйста нажмите на кнопку ниже:

Поиск видео




Anders Fogh: Covert shotgun: Automatically finding covert channels in SMT

HD
1:5:58
автор  дата 12.01.2017
  • 2625
  • 31
  • 0
 Проголосовало пользователей: 31
In this talk I will be discuss covert channels in modern CPUs. Covert channels present a way for an attacker to exfiltrate information or build command and control functionality when the attacker and victim share the same computer, but are isolated in different security domains with communication either disabled or monitored. This situation is common in cloud computing as well as in personal computers through execution of downloaded code such as Java script. The talk will focus on finding covert channels in the pipeline of modern x86-64 CPU. Initially the talk will introduce the concept of covert channels and the confinement problem as defined by Lampson in 1973. A short discussion of how covert channels are usually found will be given. I’ll continue with showing how Simultaneous Multi-Threading (SMT) is implemented in the pipeline on Intel CPUs since Sandy Bridge and how this design gives rise to covert channels. Further we’ll discuss how and why I automated the search for covert channels with a tool called Covert Shotgun. The results from Covert Shotgun will be presented and placed in a larger perspective. == About the Speaker == Anders Fogh works as Principal Security Researcher at G-DATA Advanced Analytics GmbH. He has led numerous low level engineering efforts in the past 16 years. Since 1993 he has been an avid malware hobbyist and has reverse engineering experience with operating systems from DOS to present day OSs as well as devices ranging from DVD players to USB sticks Recently he has been researching the security implications of designs of CPUs and DRAM. He presented his work at Black Hat USA 2015 and 2016. He holds a master's degree in economics from the University of Aarhus.
ЕЩЁ
  • СКАЧАТЬ MP4
автор  дата 28.08.2015
by Mark Seaborn, Halvar Flake "Rowhammer" is a problem with DRAM in which repeatedly accessing a row of memory can cause bit flips in adjacent rows.
  • СКАЧАТЬ MP4
eko13 - 2017 - Andres Blanco - 802.11 Protocol Chaos Durante los últimos años, el estándar IEEE 802.11 para uso de conectividad inalámbrica se ha tornado ...
  • СКАЧАТЬ MP4
автор  дата 19.01.2017
We've all been there - this one course at university where they tell you to actually read the log files, do proper incident response, and document everything.
  • СКАЧАТЬ MP4
In a casual conversation with Thomas “Halvar Flake” Dullien I suggested that performance counters could be used as a software mitigation for the row hammer ...
  • СКАЧАТЬ MP4
автор  дата 16.05.2017
Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power ...
  • СКАЧАТЬ MP4
автор  дата 07.01.2018
Demonstration of the CloakifyFactory toolset developed by @TryCatchHCF - https://github.com/TryCatchHCF/Cloakify for data exfiltration, in order to bypass ...
  • СКАЧАТЬ MP4
автор  дата 04.04.2017
Data Exfiltration: Secret Chat Application Using Wi-Fi Covert Channel by Yago Hansen at the BSidesMunich 2017.
  • СКАЧАТЬ MP4
автор  дата 21.10.2017
SMT Solvers in the IT Security - deobfuscating binary code with logic by Thaís Moreira Hamasaki Malware is sneaky. Malicious codes are implemented to stay ...
  • СКАЧАТЬ MP4
автор  дата 25.02.2013
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net Blackhat 2010 - Blackhat 2010 -
  • СКАЧАТЬ MP4
автор  дата 23.02.2017
These guys figured out how to leverage a fundamental operational characteristic of all modern processor architecture to penetrate the randomization of all ...
  • СКАЧАТЬ MP4
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks; Il-Gu Lee; Hyunwoo Choi; Yongdae Kim; ...
  • СКАЧАТЬ MP4
автор  дата 07.06.2017
Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus on, how the micro architectural ...
  • СКАЧАТЬ MP4
автор  дата 30.12.2015
These Are Not Your Grand Daddy's CPU Performance Counters - CPU Hardware Performance Counters For Security by Nishad Herath & Anders Fogh CPU ...
  • СКАЧАТЬ MP4
автор  дата 08.08.2016
Since Edward Snowden's extensive data exfiltration from a high-security NSA environment, there has been heightened focus on data exfiltration - not only from ...
  • СКАЧАТЬ MP4
Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures Roberto Guanciale (KTH) Presented at the 2016 IEEE Symposium on Security ...
  • СКАЧАТЬ MP4
автор  дата 22.11.2016
by Anders Fogh & Daniel Gruss Typically, hackers focus on software bugs to find vulnerabilities in the trust model of computers. In this talk, however, we'll focus ...
  • СКАЧАТЬ MP4
In recent years, attacking air gapped networks through HID devices is becoming popular. The HID attack uses the USB interface to forge the user's keystrokes or ...
  • СКАЧАТЬ MP4
автор  дата 03.08.2015
Cyber security expert, Scott Schober visits WFXL-TV to demonstrate a hidden antenna to covertly detect illegal cell phones. Berkeley's President & CEO, Scott ...
  • СКАЧАТЬ MP4
автор  дата 19.03.2016
Covert channel presentation in NUS, Singapore.
  • СКАЧАТЬ MP4
TWERK
  Популярные тэги
      Сейчас смотрят
      Пользователи

    У нас искали:


    Anders fogh: covert shotgun: automatically finding covert channels in smt (alishka) Richie gecko 유선전화 (bakit Darkest hour: putin mod: syria part 1 How to draw disney princess belle from beauty and the beast cute ... Ten tonnes Anandam episode 15 Ann ush Fkfm Devatha episode 274 Fnaf anime explained! the secret ucn story (five nights at freddy's ultimate custom night) Zeetamil Doretdeplatine Irina hindi_life Devatha episode 494 머리스타일 바꾸기 대 성공 !💫 2년만에 탈색,컷트 하고 노는 브이로그 vlog🌈 | 김무비 kim movie Мама отличника What was youtube like in 2005