Side-Channel Security: Developing a Side-Channel Mindset

About this Course

Side channels have become increasingly important over the past two decades in our digital world. With attacks like Meltdown and Spectre, which internally use side channels, they have gained world-wide relevance, as most computers on the planet are affected, and also the corresponding publicity. But why are side channels relevant to me? Because they are relevant to everyone! This course is not just a list of side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what side channels are, why they are relevant for security, how they can inadvertantly influence us or leak our own most personal secrets to others. In this first season, we will cover the basics, without requiring any technical skills. The security or side-channel mindset we teach is still highly valuable, as it allows to assess risks both in the real world and in technical contexts. In a set of small exercises, you will demonstrate that you understood the basics, and acquired the way of thinking needed to find and exploit side channels. A set of small exercises for this course will be solved online with no need to download anything.

Created by: Graz University of Technology

Level: Introductory


Related Online Courses

Is your team beginning to use Kubernetes for container orchestration? Do you need guidelines on how to start transforming your organization with Kubernetes and cloud native patterns? Would you like... more
En la era de la información en la que estamos inmersos el desarrollo de software de calidad es un factor esencial y muy importante en las ciencias de la computación. Desarrollar software de c... more
Do you want to become a better problem solver? This Java course will provide you with a strong understanding of basic Java programming elements and data abstraction using problem representation and... more
Este curso online da un repaso por los distintos menús de la herramienta Word, revisando a fondo sus distintas opciones e incidiendo en las funcionalidades de la herramienta que no son intuitivas, ... more
Vulnerabilities can occur at any stage of software development, making it critical for developers to write secure code and maintain a secured development environment and the platform it runs on. In... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL