OverTime: Remote Timing Attacks Against IoT Devices | Cristofaro Mune [@pulsoid]
This talk shows that timing attacks may be applicable wherever (time-leaking) security features are implemented on existing network-connected devices with slower clocks. This may be the case for ICS devices and critical infrastructures environments.
Read More
Recent Comments