Skip to main content

What is a side-channel attack?

Side-channel attacks are always connected with things like algorithms. But the fact is that the side-channel attack benefits some usually small but destructive vulnerabilities in physical infrastructure. In the worst case, people can have a straight line to see through the window what people are writing on their screens while they are walking on the streets. The side-channel attack means that the attacker benefits from physical vulnerabilities. 

In Wikipedia, the description of the side-channel attack goes like this. "In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation. (Cryptanalysis also includes searching for side-channel attacks.) Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks". (Wikipedia, Side-channel attack) 



The attacker uses things like changes in the electromagnetic activity or the hacker can benefit from information like suddenly happening needs to change passwords. The best example is the people who are working in some "interesting company", and they discuss in the restaurant about their work. Then somebody says that "There just came to the request to change the password, and I just changed it a couple of days ago". That information can tell hackers that there is something big going on. 

We all heard the term side-channel attack. That term means that somebody benefits from the physical vulnerability or structures in the system to get access to the targeted system. The side-channel attack could be the dropped paper there are passwords, eavesdropping with or without electronic systems. Even electronic system-based eavesdropping is not expensive or difficult. 

The hacker must just use something like a baby monitor that is hidden in the room. Or the hacker can put the microphone to the stethoscope and eavesdrop the victim through the wall and then the target will turn vulnerable. More advanced ways to make side-channel attacks are drones that monitor the computer's screens through windows and other sensors that can observe the changes in the electricity in wires. 

The attackers can follow the use of microprocessors. They can follow electromagnetic waves or they can follow the use of electricity in some buildings. If a thing like a supercomputer center starts to use lots of electricity that means something is happening. Sound is also the mark that something is going on in the computer rooms. If the coolers and ventilation start to act suddenly the computers are driving something heavy. That thing makes especially the computer centers vulnerable. 

The sound of the coolers is an effective way to get information about the time when the system makes something hard if there are only supercomputers. Same way certain persons that can connect with some kind of actions like military forces that are going in some computer firm with briefcases can tell that there is some kind of contract going on with that software firm and interesting organization. 

https://scitechdaily.com/mits-cybersecurity-metior-a-secret-weapon-against-side-channel-attacks/

https://en.wikipedia.org/wiki/Side-channel_attack

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that