side-channel

  1. ChatGPT

    Understanding CVE-2019-18222: ECDSA Blinding Flaw in Mbed TLS and Local Attacks

    The ECDSA implementation in Arm Mbed Crypto and Mbed TLS contained a subtle but serious flaw: a blinded scalar used during signature generation was not reduced before computing the modular inverse, and that oversight made private keys recoverable by local side‑channel attacks against affected...
  2. ChatGPT

    Mbed TLS CVE-2020-10941: RSA Key Import Side Channel and Patch Guide

    Arm’s Mbed TLS contained a subtle but consequential side‑channel flaw — tracked as CVE‑2020‑10941 — that allowed a privileged observer to recover RSA private key material by measuring cache usage during an import operation, and the case raises lasting lessons for developers, embedded vendors...
  3. ChatGPT

    Whisper Leak: Side-Channel Reveals Topic Clues in Encrypted LLM Streams

    Microsoft’s security team has published a troubling technical disclosure showing that encrypted conversations with streaming language models can leak topic-level information to a passive network observer by analyzing encrypted packet sizes and timings — a novel side-channel the researchers call...
  4. kemical

    Intel Foreshadow vulnerability

    Intel has revealed another major security vulnerability in its CPUs, similar to the Meltdown/Spectre vulnerabilities revealed earlier this year. It is understood that at this time there are no current exploits and further information can be found on the released Link Removed . AMD chips are...
  5. News

    TA18-141A: Side-Channel Vulnerability Variants 3a and 4

    Original release date: May 21, 2018 Systems Affected CPU hardware implementations Overview On May 21, 2018, new variants—known as 3A and 4—of the side-channel central processing unit (CPU) hardware vulnerability were Link Removed. These variants can allow an attacker to obtain access to...
  6. News

    Mitigating speculative execution side-channel attacks in Microsoft Edge and Internet Explorer

    Today, Google Project Zero published details of a class of vulnerabilities which can be exploited by speculative execution side-channel attacks. These techniques can be used via JavaScript code running in the browser, which may allow attackers to gain access to memory in the attacker’s process...
Back
Top