Skip to content

The material for the hands-on session "Turning Timing Differences into Data Leakage" at Mic-Sec 2022

Notifications You must be signed in to change notification settings

cispa/micsec-training

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Turning Timing Differences into Data Leakage

This is a hands-on training session by Daniel Weber and Michael Schwarz given for the International Winter School on Microarchitectural Security 2022 (Mic-Sec '22).

Overview

In this repository you can find the three exercises (together with their solutions) and the presentation slides.

Requirements

CPU

We require an x86 CPU. The exercises were tested on a modern Intel CPU. While they should also work for most non-Intel CPUs, we did not explicitly tested this.

Operating System

We assume a native Linux installation. While the exercises may still work when executed in a VMs or the Windows Subsystem for Linux (WSL) the results are likely instable.

Noise Reduction

Microarchitecutral experiments are by their nature prone to noise on the system. Hence, the following steps can be taken to ensure that the exercises work more stable:

  • If you are working on an Laptop, connect it to power.
  • Stop all unneccessary programs running on the system. Especially music or video streaming.

Contact

If you have questions or find bugs in our exercises, feel free to reach out to us on Twitter or email:

  • Daniel Weber
    • Twitter: @weber_daniel
    • Email: daniel.weber (AT) cispa.de
  • Michael Schwarz
    • Twitter: @misc0110
    • Email: michael.schwarz (AT) cispa.de

About

The material for the hands-on session "Turning Timing Differences into Data Leakage" at Mic-Sec 2022

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published