#rC3 - Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)

Title:
#rC3 - Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom? (en)
Description:

https://media.ccc.de/v/rc3-11404-attacking_cpus_with_power_side_channels_from_software_warum_leaked_hier_strom_en

Everyone knows and loves the famous line from the cinematic masterpiece where the IT-Security specialist asks the CPU architect: "Warum leaked hier Strom?" (Why is power leaking here?).

In this talk, we want to answer that question. We demonstrate how we can attack modern processors purely in software, relying on techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With PLATYPUS, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.

Moritz Lipp Michael Schwarz Daniel Gruss Andreas Kogler

https://fahrplan.events.ccc.de/rc3/2020/Fahrplan/events/11404.html

more » « less
Video Language:
English
Duration:
59:17
Format: Youtube Primary Original
Format: Youtube
This video is part of Amara Public.

Subtitles download

Incomplete subtitles (1)