Skip to content

TheLeopardsH/Software_based_side_channel_attacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 

Repository files navigation

Software based Side Channel attacks

•C/C++/assembly are not memory-safe: •No bounds checking on array accesses •No validity checks on pointer arithmetic or dereferencing •Process-based address space isolation does not isolate code from itself!: •Malicious inputs can trigger inappropriate memory accesses •Attackers can use those accesses to: •Steal sensitive data from a process or the kernel •Subvert the process’s control flow •Escalate privilege