What is our typical threat model for security?
How is threat actually more complicated?
What is a side channel?
- when secrets leak outside the protocol because of how it's implemented
What is a covert channel?
When an adversary tries to leak secrets by hidin them in normal communications
What are the two ways information is leaked?
What are some of the kinds of side channels?
How does a timing side channel work?
What are different real-world examples of timing side channels?
Explain the practical attack on OpenSSL (Brumley&Boneh 02)
What is the multiplication timing dependency?
What is the reduction timing dependency?
What is the Data Dependency Summary?
What were the results of an attack extract RSA private key?
How do hardware side channels work?
What is an example of a simple power analysis?
What are defenses to power side channels?
What are examples of fault side channels?
What is the emanation side channel? what is it's history?
What is the emanations video signal example?
Explain video timing of emanations
How does a source signal affect a picture?
What does optics being bounced off a wall do to a picture?
What is Bakes et al's research on emanations?
How do accoustic emanations from typing work?
How can acoustic emanations from typing be extending using learning model?
How difficult is it for acoustic emations from typing to be effective? What are the challenges to defend against it?