搜索结果: 1-5 共查到“军事学 drive”相关记录5条 . 查询时间(0.012 秒)
Drive-by Key-Extraction Cache Attacks from Portable Code
Side-channel attack cache attack web page confinement
2018/2/1
We show how malicious web content can extract cryptographic secret keys from the user's computer. The attack uses portable scripting languages supported by modern browsers to induce contention for CPU...
Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
AES block ciphers hardware Trojan
2015/12/24
As part of the revelations about the NSA activities,
the notion of interdiction has become known to the public:
the interception of deliveries to manipulate hardware in a way
that backdoors are int...
got HW crypto? On the (in)security of a Self-Encrypting Drive series
Hardware cryptography weak key attack weak authentication attack
2015/12/22
Self encrypting devices (SEDs) doing full disk encryption are getting more and more widespread.
Hardware implemented AES encryption provides fast and transparent encryption of all user data on
the s...
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memory and consequently de...
A Critical Analysis and Improvement of AACS Drive-Host Authentication
Critical Analysis AACS Drive-Host Authentication
2008/5/22
This paper presents a critical analysis of the AACS drive-host authentication scheme. A few
weaknesses are identified which could lead to various attacks on the scheme. In particular, we
observe tha...