Tagged articles
6 articles
Page 1 of 1
Bilibili Tech
Bilibili Tech
Mar 17, 2022 · Information Security

How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques

This article explains why side‑channel attacks threaten SM2, SM3, and SM4 algorithms, describes the vulnerabilities of table‑lookup and double‑and‑add implementations, and presents constant‑time scalar multiplication and selection methods in Go to protect private keys on blockchain platforms.

GoSM2constant-time
0 likes · 13 min read
How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques
Sohu Tech Products
Sohu Tech Products
Mar 2, 2022 · Information Security

Understanding the Spectre Vulnerability and Browser Mitigations

This article explains the Spectre hardware side‑channel vulnerability, its exploitation via speculative execution and cache timing, demonstrates simple JavaScript attacks, and reviews various browser mitigation strategies such as cache‑control headers, disabling high‑resolution timers, COOP, COEP, and CORB to reduce attack surface.

Browser SecurityMitigationsSpectre
0 likes · 15 min read
Understanding the Spectre Vulnerability and Browser Mitigations
Liangxu Linux
Liangxu Linux
Oct 19, 2020 · Information Security

Exploiting Linux’s DelayedACKLost Counter to Infer TCP Sequence Numbers

An imaginative tale reveals how two covert agents exploit the Linux kernel’s DelayedACKLost counter via /proc/net/netstat, using it to infer TCP sequence numbers and perform a side‑channel hijack, while illustrating the underlying delayed ACK mechanism, related kernel functions, and the security implications of this hidden metric.

Delayed ACKKernelLinux
0 likes · 8 min read
Exploiting Linux’s DelayedACKLost Counter to Infer TCP Sequence Numbers
Liangxu Linux
Liangxu Linux
May 8, 2020 · Information Security

How Hackers Can Leak Data from Air‑Gapped PCs Using Fan Vibrations

Researchers demonstrate that even computers isolated from networks can exfiltrate secret data by modulating fan speed to create vibrations that a nearby smartphone’s accelerometer can capture and decode, revealing a new low‑bandwidth side‑channel attack called AiR‑ViBeR.

air-gapdata exfiltrationfan vibration
0 likes · 8 min read
How Hackers Can Leak Data from Air‑Gapped PCs Using Fan Vibrations
Alibaba Cloud Native
Alibaba Cloud Native
Mar 29, 2018 · Information Security

Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks

The article explains the Meltdown vulnerability affecting Intel CPUs, detailing how malicious unprivileged code can exploit out‑of‑order execution and a Flush+Reload side‑channel to read kernel memory, describing the attack path, secret channel construction, page‑fault handling, probe array setup, and code examples.

ExploitIntelMeltdown
0 likes · 9 min read
Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks