Plundervolt - Software-Based Fault Injection Attacks against Intel SGX

Plundervolt - Software-Based Fault Injection Attacks against Intel SGX

IEEE Symposium on Security and Privacy via YouTube Direct link

Intro

1 of 12

1 of 12

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Plundervolt - Software-Based Fault Injection Attacks against Intel SGX

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 TEES Trusted Execution Environments
  3. 3 DVES Dynamic voltage and frequency scaling
  4. 4 Undervolting Intel CPUs
  5. 5 Investigating faults in SGX
  6. 6 Fault analysis
  7. 7 Detailed CPU testing
  8. 8 Faulting RSA
  9. 9 Faulting AES-NÍ
  10. 10 When a single random byte fault is induced at the input of the eighth round, the AES key can be deduced. The computation complexity to recover 128 bit key is: 232 +256 encryptions.
  11. 11 Memory corruption
  12. 12 To summarise

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.