A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker’s ability to learn...
Read more
Computer News: MIT researchers devise a way to evaluate cybersecurity methods
- bob_turner
- Bedrock
- Posts: 87604
- Joined: Fri May 25, 2018 5:14 pm
- 6
- Mood: