Apple's M1 chip has a vulnerability that can't be fixed without a silicon revision, according to developer Hector Martin. The flaw allows for covert channels that enable two malicious apps to talk to ...
Covert Channel Between the CPU and An FPGA By Modulating The Usage of the Power Distribution Network
use Time-to-Digital Converter sensors to observe these power variations. The sensor circuits are programmed into the FPGA fabric using only standard logic components. Our covert channel achieves a ...
A transfer of information that violates a computer's built-in security systems. A covert storage channel refers to depositing information in a memory or storage location that can be accessed by ...
A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate data from physically isolated (air-gapped) systems. Researchers at the School of Cyber Security ...
“To operate efficiently across a wide range of workloads with varying power requirements, a modern processor applies different current management mechanisms, which briefly throttle instruction ...
A new data exfiltration technique has been discovered, which uses a covert ultrasonic channel to leak sensitive information from air-gapped computers to a nearby smartphone device. The adversarial ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results