Juniata Classifieds>Juniata Online Courses>Introduction to Software Side Channels and Mitigations

Introduction to Software Side Channels and Mitigations

About this Course

Same as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels. In this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.

Created by: Graz University of Technology

Level: Introductory


Related Online Courses

In recent decades the sustainable conservation of cultural heritage has become a crucial global challenge. In this context, the trend towards largescale urbanization raises questions as to how new... more
La ciberseguridad ha tomado una especial relevancia en el mundo moderno por su capacidad de proteger información frente a ataques cibernéticos, convirtiéndose en una de las áreas de mayor emp... more
If you’re ready to enter the world of Information Technology (IT), you need job-ready skills. Understanding the fundamentals of computer hardware and operating systems is critical to any t... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
Most data science projects fail. There are various reasons why, but one of the primary reasons is the challenge of deployment. One piece to the deployment puzzle is understanding how to automate... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL