University of Maryland Classifieds>University of Maryland Online Courses>Side-Channel Security: Developing a Side-Channel Mindset

Side-Channel Security: Developing a Side-Channel Mindset

About this Course

Side channels have become increasingly important over the past two decades in our digital world. With attacks like Meltdown and Spectre, which internally use side channels, they have gained world-wide relevance, as most computers on the planet are affected, and also the corresponding publicity. But why are side channels relevant to me? Because they are relevant to everyone! This course is not just a list of side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what side channels are, why they are relevant for security, how they can inadvertantly influence us or leak our own most personal secrets to others. In this first season, we will cover the basics, without requiring any technical skills. The security or side-channel mindset we teach is still highly valuable, as it allows to assess risks both in the real world and in technical contexts. In a set of small exercises, you will demonstrate that you understood the basics, and acquired the way of thinking needed to find and exploit side channels. A set of small exercises for this course will be solved online with no need to download anything.

Created by: Graz University of Technology

Level: Introductory


Related Online Courses

Code and run your first Python program in minutes without installing anything! **** This course is designed for learners with limited coding experience, providing a solid foundation of not just... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
This course is designed to teach you how systems are developed using IoT technology. Many engineers and developers tend to focus ona single discipline - either software or hardware. However, in... more
On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are... more
En la era de la información en la que estamos inmersos el desarrollo de software de calidad es un factor esencial y muy importante en las ciencias de la computación. Desarrollar software de c... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL