TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Timing attack on Arduino

17 点作者 epsylon将近 10 年前

1 comment

edude03将近 10 年前
While I realize this was an example of how side channel attacks work, timing attack happen over and over again in the real world, for example back in 2008 the xbox 360 per console key could be recovered allowing downgrading to a vulnerable kernel.<p><a href="http:&#x2F;&#x2F;beta.ivc.no&#x2F;wiki&#x2F;index.php&#x2F;Xbox_360_Timing_Attack" rel="nofollow">http:&#x2F;&#x2F;beta.ivc.no&#x2F;wiki&#x2F;index.php&#x2F;Xbox_360_Timing_Attack</a><p>For the curious, the solution is to use a constant time comparison function, which can usually be done by not returning until the end of the comparison loop
评论 #9734065 未加载