Course description
Introduction to Software Side Channels and Mitigations
Same as the prerequisite course, we do not just enumerate side-channel effects and how to exploit them. We provide you with the experience of learning about side channels, in a group of students, living in a shared appartment. Together with them you will figure out that what software side channels are, why they are relevant for cybersecurity, in particular in our modern digital lifes, where all our secrets are stored on computers that can be subverted using side channels.
In this course, we get one step closer to hugely impactful attacks like Meltdown and Spectre, which internally use side channels. We will learn about different simple software-based side channels and how they can be exploited. We will cover the basics, requiring some programming skills. We again focus on the security or side-channel mindset, as a crucial take-away for you, that you will be able to apply on a day-to-day basis in your studies, your job, and your personal life. You will extend your view on side channels and be able to assess risks in technical contexts in detail. In a set of small exercises, you will demonstrate that you understood the basics, and are able to find and exploit side channels in small software programs.
Upcoming start dates
Who should attend?
Prerequisites:
- Knowledge and skills from the prerequisite course Side Channel Security S1: Side Channel and Computer Security Mindset.
- We expect basic programming skills that you may have obtained as part of a university program such as computer science or a high school degree with a focus on computer science.
Training content
Episode 1: Raiders of the Lost Account
Manuel loses access to his online account. In a search to recover it, the flat mates discover how to get from small variations in the execution to a side-channel attack on the PIN entry.
Episode 2: Memory
Claudio runs a course grading server. Our flat mates set out to find a flaw in it and discover a new means of attacking software, by flushing and reloading memory (the so-called Flush+Reload attack).
Episode 3: Not on my Watch
Lukas and Andreas miss a deadline and use Flush+Reload to still get a signature on their assignments even though the deadline has passed.
Episode 4: Justice Leak
Claudio's course grading server corrupts an assignment, leading to an unfair zero points for some flat mates. They try to get justice and their points back, by using Flush+Reload again.
Episode 5: Flush+Reload: Endgame
With all these attacks, and specific mitigations against them, the flatmates discuss possible generic mitigations against Flush+Reload.
Course delivery details
This course is offered through Graz University of Technology, a partner institute of Trinity College.
2-3 hours per week
Costs
- Verified Track -$149
- Audit Track - Free
Certification / Credits
What you'll learn
- Spot and exploit side-channel leakage in simple software programs
- Use different software-based side channels to extract secret information
- Connect these security risks with methods to mitigate and close side channels
Contact this provider
edX
edX For Business helps leading companies upskill their labor forces by making the world’s greatest educational resources available to learners across a wide variety of in-demand fields. edX For Business delivers high-quality corporate eLearning to train and engage your employees...