TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Timing attack on Arduino

17 pointsby epsylonalmost 10 years ago

1 comment

edude03almost 10 years ago
While I realize this was an example of how side channel attacks work, timing attack happen over and over again in the real world, for example back in 2008 the xbox 360 per console key could be recovered allowing downgrading to a vulnerable kernel.<p><a href="http:&#x2F;&#x2F;beta.ivc.no&#x2F;wiki&#x2F;index.php&#x2F;Xbox_360_Timing_Attack" rel="nofollow">http:&#x2F;&#x2F;beta.ivc.no&#x2F;wiki&#x2F;index.php&#x2F;Xbox_360_Timing_Attack</a><p>For the curious, the solution is to use a constant time comparison function, which can usually be done by not returning until the end of the comparison loop
评论 #9734065 未加载