side-channel attacks

SLAP/FLOP: Apple Silicon’s ‘Son of Spectre’ Critical Flaws
Richi Jennings | | Apple, apple bug, Apple Data Security, Apple Silicon, ARM, Arm CPU Attack, arm64, Daniel Genkin, FLOP, iPad, iPhone, Jalen Chuang, Jason Kim, Mac, SB Blogwatch, Side-Channel, side-channel attack, side-channel attacks, SLAP, Spectre, Spectre attack, Spectre variant, speculative execution, Yuval Yarom
Watch this: Want more “speculative execution” bugs? You’re gonna be in a great mood all day ...
Security Boulevard
New Attack Against Self-Driving Car AI
Bruce Schneier | | academic papers, Artificial Intelligence, cars, cyberattack, side-channel attacks, Uncategorized
This is another attack that convinces the AI to ignore road signs: Due to the way CMOS cameras operate, rapidly changing light from fast flashing diodes can be used to vary the ...
Hardware Vulnerability in Apple’s M-Series Chips
It’s yet another hardware side-channel attack: The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access ...
ChatGPT Plugin Security Vulnerabilities Exploited By Hackers
Wajahat Raja | | AI Assistants, ChatGPT, Cyber Threats, Cybersecurity, Cybersecurity News, Data breaches, digital security, Encryption Protocols, Hackers, OAuth Workflow, Penetration Testing, Plugin Security, security measures, side-channel attacks, Vulnerabilities, Zero-click Attacks
In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...

‘PrintListener’ Attack on Fingerprint Readers — Can You Trust Biometrics?🤞
Richi Jennings | | biometric, biometric authentication, biometric data, Biometric Data Abuse, biometric identification, biometric identity, biometric security, biometrics, biometrics authentication, Biometrics-Based Authentication, digital biometrics, digital fingerprint, Fingerprint Scanners, fingerprint scanning, Fingerprint Sensor Vulnerabilities, fingerprint sensors, fingerprints, PrintListener, SB Blogwatch, Side-Channel, side-channel attack, side-channel attacks, sidechannelattacks, touchless fingerprint
Mic Check: Researchers reconstruct your fingerprint by listening to you swipe ...
Security Boulevard
Side Channels Are Common
Really interesting research: “Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.” Abstract: We show that built-in sensors in commodity PCs, such as microphones, inadvertently capture electromagnetic side-channel leakage from ...
Power LED Side-Channel Attack
This is a clever new side-channel attack: The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader—or of an attached ...
Security Analysis of Threema
Bruce Schneier | | academic papers, Authentication, cryptanalysis, encryption, side-channel attacks, threat models, Uncategorized, Vulnerabilities
A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...
Recovering Smartphone Voice from the Accelerometer
Yet another smartphone side-channel attack: “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers“: Abstract: Eavesdropping from the user’s smartphone is a well-known threat to the user’s safety ...
Leaking Screen Information on Zoom Calls through Reflections in Eyeglasses
Okay, it’s an obscure threat. But people are researching it: Our models and experimental results in a controlled lab setting show it is possible to reconstruct and recognize with over 75 percent ...