Side-Channel Attacks on Everyday Applications

by Taylor Hornby
Sept. 16, 2017 0 comments www.blackhat.com belen_caty Detection & Response

In this talk, I'll briefly describe how the FLUSH+RELOAD attack works, and how it can be used to build input distinguishing attacks. In particular, I'll demonstrate how when the user Alice browses around the top 100 Wikipedia pages, the user Bob can spy on which of those pages she's visiting

https://www.blackhat.com/us-16/briefings.html#side-channel-attacks-on-everyday-applications