У нас вы можете посмотреть бесплатно WOOT '25 - Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72... или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution Harishma Boyapally and Dirmanto Jap, Temasek Laboratories, Nanyang Technological University, Singapore; and National integrated Centre For Evaluation, Nanyang Technological University, Singapore; Qianmei Wu, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore; and School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, China; Fan Zhang, School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, China; Shivam Bhasin, Temasek Laboratories, Nanyang Technological University, Singapore; and National integrated Centre For Evaluation, Nanyang Technological University, Singapore Side-channel analysis (SCA) has posed a significant threat to systems for nearly three decades. Numerous practical demonstrations have targeted everyday devices, such as smart cards, cryptocurrency wallets, and smartphones. However, much of the research in the public domain has focused on low-end microcontrollers, limiting our understanding of the challenges involved in attacking more complex systems. In this work, we conduct a reality check on SCA by targeting a high-performance ARM Cortex-A72 out-of-order processor, commonly found in smartphones. We evaluate the practical effort required for key recovery attacks, considering various threat models, from basic to advanced. Our results show that while basic approaches fail, advanced approaches like deep learning-based SCA can successfully recover the secret key. This multi-tier evaluation approach is crucial for comprehensive risk assessment and informed decision-making regarding mitigation strategies, balancing security, performance, and area constraints. View the full WOOT '25 program at https://www.usenix.org/conference/woo...