OverTime: Remote Timing Attacks Against IoT Devices | Cristofaro Mune [@pulsoid]

This talk shows that timing attacks may be applicable wherever (time-leaking) security features are implemented on existing network-connected devices with slower clocks. This may be the case for ICS devices and critical infrastructures environments.

Read More