Juniata Classifieds>Juniata Online Courses>Side-Channel Security: Developing a Side-Channel Mindset

Side-Channel Security: Developing a Side-Channel Mindset

About this Course

Side channels have become increasingly important over the past two decades in our digital world. With attacks like Meltdown and Spectre, which internally use side channels, they have gained world-wide relevance, as most computers on the planet are affected, and also the corresponding publicity. But why are side channels relevant to me? Because they are relevant to everyone! This course is not just a list of side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what side channels are, why they are relevant for security, how they can inadvertantly influence us or leak our own most personal secrets to others. In this first season, we will cover the basics, without requiring any technical skills. The security or side-channel mindset we teach is still highly valuable, as it allows to assess risks both in the real world and in technical contexts. In a set of small exercises, you will demonstrate that you understood the basics, and acquired the way of thinking needed to find and exploit side channels. A set of small exercises for this course will be solved online with no need to download anything.

Created by: Graz University of Technology

Level: Introductory


Related Online Courses

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to... more
Computing involves processing information. In order to be processed, information must be represented in such a way that it can be manipulated by a machine ubiquitous in today’s society - the c... more
L’expérience utilisateur se définit comme étant le résultat des états internes (ex. attentes, prédispositions) d’un utilisateur, des caractéristiques d’un système (ex. complexité, utilisabilité)... more
During the past decade we have witnessed a phenomenal growth in Industrial IoT applications (IIoT) and autonomous systems. This has resulted in a paradigm shift in the networking domain. As a... more
Para el proceso de minería de datos es fundamental conocer a priori qué productos compran nuestros clientes y hacer un análisis de la cesta de la compra con los datos de entrada disponibles. Es... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL