Between Physical and Sofware: Fault Attacks, Side Channels, and Mitigations
About this Course
In this course, we build upon the knowledge we built up on cache side-channel attacks and transient-execution attacks, as well as the side-channel and security mindset. We again go beyond software-based side-channel attacks and now study software-based fault attacks. Fault attacks (sometimes also called active side-channel attacks ) are an incredibly powerful means to attack a system. Instead of just leaking secrets from an application or device, fault attacks actively manipulate the application or device to induce incorrect behavior which lets the attacker again leak secrets or fully take over control and subvert the application or device. We will look at fault attacks that can be triggered from software, namely Rowhammer and Plundervolt. We will then draw the connection between these attacks and transient-execution attacks that share some similarities. You will implement some of these attacks yourself and learn how they are mitigated.Created by: Graz University of Technology
Level: Advanced

Related Online Courses
Get the most out of your search engine skills! While searching on the Internet is easy and fast, it’s not intuitive or straightforward. This course, Power Searching With Google, covers e... more
Build on your existing knowledge of conditionals, loops, and functions by studying more about complex Python data structures, including strings, lists, dictionaries, and file input and output.... more
This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in... more
Students will build on the skills learned from “Introduction to Object-Oriented Programming with Java I: Foundations and Syntax Basics” and learn the basics of writing classes that serve as blu... more
Employing monitoring and observability solutions are crucial skills for Software Developers and DevOps professionals to ensure continuous uptime and delivery for their applications. Monitoring is... more