Leaky Processors - Stealing Your Secrets With Foreshadow
AI, Data Science & Business Certificates from Google, IBM & Microsoft
The Most Addictive Python and SQL Courses
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the critical security vulnerability known as Foreshadow in this 41-minute conference talk from OWASP BeNeLux Day 2018. Delve into the intricacies of how this speculative execution attack can compromise Intel SGX enclaves, virtualization environments, and operating system kernel memory. Learn about the technical details of the attack, its implications for secure computing, and potential mitigation strategies. Gain insights into the broader landscape of hardware-based security threats and the ongoing challenges in protecting sensitive data in modern computing systems.
Syllabus
BeNeLux Day 2018: Leaky Processors: Stealing Your Secrets With Foreshadow - Jo Van Bulck
Taught by
OWASP Foundation