When you enroll through our links, we may earn a small commission—at no extra cost to you. This helps keep our platform free and inspires us to add more value.

TUGrazX logo

TUGrazX: Between Physical and Sofware: Fault Attacks, Side Channels, and Mitigations

Fault attacks (sometimes also called active side-channel attacks ) are a very powerful means that goes beyond just leaking secrets from an application or device, to actively manipulating it. We will look at fault attacks that can be triggered from software, namely Rowhammer and Plundervolt. We will also learn that some transient-execution attacks have some similarities to fault attacks. You will implement some of these attacks yourself and learn how they are mitigated.

     0 |
  • Reviews ( 0 )
₹10707

This Course Includes

  • iconedx
  • icon0 (0 reviews )
  • icon10 weeks at 3-4 hours per week
  • iconenglish
  • iconOnline - Self Paced
  • iconcourse
  • iconTUGrazX

About TUGrazX: Between Physical and Sofware: Fault Attacks, Side Channels, and Mitigations

In this course, we build upon the knowledge we built up on cache side-channel attacks and transient-execution attacks, as well as the side-channel and security mindset. We again go beyond software-based side-channel attacks and now study software-based fault attacks. Fault attacks (sometimes also called active side-channel attacks ) are an incredibly powerful means to attack a system. Instead of just leaking secrets from an application or device, fault attacks actively manipulate the application or device to induce incorrect behavior which lets the attacker again leak secrets or fully take over control and subvert the application or device. We will look at fault attacks that can be triggered from software, namely Rowhammer and Plundervolt. We will then draw the connection between these attacks and transient-execution attacks that share some similarities. You will implement some of these attacks yourself and learn how they are mitigated.

What You Will Learn?

  • - Understand different methods to induce hardware faults from software on modern computers - Understand how these faulting mechanisms can undermine a system's security - Understand the security risks posed and how fault attacks can be mitigated.