
CyberWire Daily From secret images to encryption keys. [Research Saturday]
4 snips
May 18, 2024 Hosein Yavarzadeh from UC San Diego discusses control-flow attacks on high-performance CPUs, revealing how attackers can access specific CPU parts for dangerous exploits. They demonstrate recovering a secret image and extracting an AES encryption key, highlighting severe security vulnerabilities in these systems.
Chapters
Transcript
Episode notes
1 2 3 4 5
Introduction
00:00 • 2min
Branch Predictor Functionality and Novel Attack Methods
01:54 • 5min
Streamlining Identity Management and Strengthening Security with Strata Identity Fabric
07:07 • 3min
Enhancing Security through Branch Predictor State Flushing
10:17 • 6min
Insights on High-Resolution Control Flow Attacks and Cybersecurity Feedback
15:53 • 3min

