D'Youville Classifieds>D'Youville Online Courses>Introduction to Software Side Channels and Mitigations

Introduction to Software Side Channels and Mitigations

About this Course

Same as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels. In this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.

Created by: Graz University of Technology

Level: Introductory


Related Online Courses

Este curso ofrece un enfoque interdisciplinario de la sostenibilidad en Arquitectura. Los alumnos conocerán los elementos básicos de las evaluaciones de sostenibilidad (primera capa del modelo), a... more
What is good game design? How do you come up with good game ideas? How do you start documenting your ideas? How do you create an experience? How do you write a rule book? These are some of the... more
This quantum computing course explores the basic design principles of today's quantum computer systems. In this course, students will learn to work with the IBM Qiskit software tools to write... more
Along with bigger and faster Cloud Computing power, comes the necessity of network security and management. This course focuses on the fundamental elements that every network requires: privacy,... more
Port cities are dynamic environments. They face ever-changing challenges and demands from port activities under continually evolving economic and environmental circumstances. They also offer a rich... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL