Side-Channel Attacks on Everyday Applications

by Taylor Hornby Sept. 16, 2017 via www.blackhat.com submitted by belen_caty

In this talk, I'll briefly describe how the FLUSH+RELOAD attack works, and how it can be used to build input distinguishing attacks. In particular, I'll demonstrate how when the user Alice browses around the top 100 Wikipedia pages, the user Bob can spy on which of those pages she's visiting

https://www.blackhat.com/us-16/briefings.html#side-channel-attacks-on-everyday-applications