Trending

#SideChannel

Latest posts tagged with #SideChannel on Bluesky

Latest Top
Trending

Posts tagged #SideChannel

Side-Channel Attacks Against LLMs Here are three papers describing different side-channel attacks against LLMs. “Remote Timing Attacks on Efficient Language Model Inference“: > **Abstract:** Scaling up language models has significantly increased their capabilities. But larger models are slower models, and so there is now an extensive body of work (e.g., speculative sampling or parallel decoding) that improves the (average case) efficiency of language model generation. But these techniques introduce data-dependent timing characteristics. We show it is possible to exploit these timing differences to mount a timing attack. By monitoring the (encrypted) network traffic between a victim user and a remote language model, we can learn information about the content of messages by noting when responses are faster or slower. With complete black-box access, on open source systems we show how it is possible to learn the topic of a user’s conversation (e.g., medical advice vs. coding assistance) with 90%+ precision, and on production systems like OpenAI’s ChatGPT and Anthropic’s Claude we can distinguish between specific messages or infer the user’s language. We further show that an active adversary can leverage a boosting attack to recover PII placed in messages (e.g., phone numbers or credit card numbers) for open source systems. We conclude with potential defenses and directions for future work...

#SideChannel Attacks Against LLMs

www.schneier.com/blog/archives/2026/02/si...

#cybersecurity #AI #LLM

0 0 0 0
Original post on infosec.exchange

This is a fascinating use of a #sidechannel timing attack against calls to an #AI model.

By capturing encrypted TLS traffic and measuring timing, they can _very accurately_ determine which streams corresponded to an LLM conversation about a pre-selected topic.

TLS is intact. So their ability […]

0 1 1 0
Microsoft Microsoft researchers detail

🔒 Privacy Alert: Microsoft's 'Whisper Leak' attack can identify AI chat topics even through encryption. By analyzing packet sizes & timing, it spies on conversations with OpenAI, Mistral & more. #AI #Privacy #CyberSecurity #SideChannel

1 0 0 0
Whisper Leak: Side-Channel Attack on LLMs

~Microsoft~
A new side-channel attack can infer topics of encrypted LLM conversations by analyzing network traffic packet sizes and timing.
-
IOCs: (None identified)
-
#AI #Privacy #SideChannel #ThreatIntel

0 0 0 0

Hackers can steal 2FA codes and private messages from Android phones #android #pixnapping #vulnerability #leak #cybersecurity #2fa #privacy #screen #pixel #sidechannel

0 0 0 0

Hackers can steal 2FA codes and private messages from Android phones https://arstechni.ca #sidechannel #pixnapping #Security #android #privacy #Biz&IT #Google

1 0 0 0
Bit-Level Netlist Augmentation to Counter Power‑Side Channel Attacks

Bit-Level Netlist Augmentation to Counter Power‑Side Channel Attacks

Bit‑level netlist augmentation adds gates to eliminate CPA correlation peaks on an AES core. The paper (6 Oct 2025, arXiv:2510.04640) reports improved side‑channel resistance. Read more: getnews.me/bit-level-netlist-augmen... #sidechannel #hardware

0 0 0 0
Statistical Model Checking Boosts Microarchitectural Side‑Channel Evaluation

Statistical Model Checking Boosts Microarchitectural Side‑Channel Evaluation

Statistical Model Checking was used on three side‑channel case studies, giving confidence without abstract models. DOI 10.48550/arXiv.2510.02475. Read more: getnews.me/statistical-model-checki... #statisticalmodelchecking #sidechannel

0 0 0 0
Side-Channel Risks in Speculative Decoding for Large Language Models

Side-Channel Risks in Speculative Decoding for Large Language Models

Researchers found a side‑channel in speculative decoding that can fingerprint queries with up to 100% accuracy on REST and leak data at over 25 tokens per second. Read more: getnews.me/side-channel-risks-in-sp... #speculativdecoding #sidechannel

0 0 0 0
Side-Channel Attack Reveals 3D Printer Design Theft Risk

Side-Channel Attack Reveals 3D Printer Design Theft Risk

Power side‑channel analysis of industrial powder‑bed fusion 3D printers reconstructed designs with up to 90.29% true positives and false positives as low as 7.02%. Read more: getnews.me/side-channel-attack-reve... #additivemanufacturing #sidechannel

0 0 0 0
Post image Post image Post image

In the Afternoon, our PhD students hosted the Software Side-Channels Lab, where the participants experimented with various microarchitectural side channels.

#GSW25 #Software #SideChannel

5 1 0 0
Post image

🆕 ML-KEM (Kyber) starter kits for STM32
A compact, hands-on lab that guides you through a full side-channel attack on an unprotected ML-KEM (Kyber) MCU implementation. eshard.com/contact

#postquantum #pqc #sidechannel

1 0 0 0

New research reveals timing side channels can leak ChatGPT prompts, exposing confidential info through subtle delays. AI security needs to consider more than just inputs.
Read more: dl.acm.org/doi/10.1145/...
#AIsecurity #SideChannel #LLM

1 0 0 0
Post image

Catch us at Hardwear. io later this month!

We’re bringing our side-channel attack bench demo and showing how easily it integrates with the esDynamic platform.

#hardware #hardwear_ioUSA #sidechannel

0 1 0 0
Preview
CHES 2025 Cryptographic Hardware and Embedded Systems

The CHES 2025 Challenge is coming back with two tracks!

🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.

🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.

🔗 ches.iacr.org/2025/challen...

#CHES2025 #SideChannel #HardwareSecurity

2 1 0 0
Preview
CHES 2025 Cryptographic Hardware and Embedded Systems

The CHES Challenge is coming back in 2025 with two tracks!

🔬 GE Wars: Test your DL-SCA skills on real-world AES EM traces.

🔧 HACK@CHES'25: Dive into hardware security on a custom OpenTitan SoC.

🔗 ches.iacr.org/2025/challen...

#CHES2025 #SideChannel #HardwareSecurity

2 1 0 0
Preview
Intel: Another attack bypasses all previous CPU protection measures Intel is on a roll: Another vulnerability opens up many processors to side-channel attacks again despite previous protective measures.

Intel: Another attack bypasses all previous CPU protection measures. Another vulnerability opens up many processors to side-channel attacks again despite previous protective measures...
#CyberSecurity #Intel #CPU #Vulnerability #SideChannel
www.heise.de/en/news/Inte...

0 1 0 0
Preview
Intel: Ein weiterer Angriff umgeht alle bisherigen CPU-Schutzmaßnahmen Intel hat einen Lauf: Eine weitere Sicherheitslücke öffnet viele Prozessoren erneut für Seitenkanalangriffe trotz bisheriger Schutzmaßnahmen.

Intel: Ein weiterer Angriff umgeht alle bisherigen CPU-Schutzmaßnahmen. Eine weitere Sicherheitslücke öffnet viele Prozessoren erneut für Seitenkanalangriffe trotz bisheriger Schutzmaßnahmen...
#CyberSecurity #CPU #Vulnerability #SideChannel
www.heise.de/news/Intel-E...

1 1 1 0

🚨 TCHES 2025 Issue 4 Submission Deadline: April 15, 2025!
Submit your research on cryptographic hardware & software to CHES- happening this September in Kuala Lumpur!
More info: ches.iacr.org/2025/callfor...
#CHES2025 #Cryptography #HardwareSecurity #SideChannel #IACR #EmbeddedSystems #CallForPapers

1 1 0 0
Post image

“KernelSnitch: Side Channel-Attacks on Kernel Data Structures” by Lukas Maar 📄👇
www.ndss-symposium.org/wp-content/u...

#NDSSsyposium2025 #SideChannel

1 0 1 0
Post image

“Power-Related Side-Channel Attacks using the Android Sensor Framework” by Mathias Oberhuber 📄👇
www.ndss-symposium.org/wp-content/u...

#NDSSsyposium2025 #SideChannel

1 0 1 0
Post image

“A Systematic Evaluation of Novel and Existing Cache Side Channels” by Fabian Rauscher 📄👇
www.ndss-symposium.org/wp-content/u...

#NDSSsyposium2025 #SideChannel

1 0 1 0

Secure Application Programming in the presence of Side Channel Attacks

Marc Witteman

riscureprodstorage.blob.core.windows.net/production/2...

#riscure #hardwarehacking #sidechannel

0 0 0 0
hardware bench for side-channel analysis and electromagnetic fault injection

hardware bench for side-channel analysis and electromagnetic fault injection

Post image Post image Post image

Starting the week by shipping out some Hardware Benches to our customers 🚛

#cybersecurity #hardware #sidechannel #faultinjection

0 0 0 0
Preview
New Apple CPU side-channel attacks steals data from browsers A team of security researchers has disclosed new side-channel vulnerabilities in modern Apple processors that could steal sensitive information from web browsers.

Apple Computer launched their own line of chips a way back. Unsurprisingly, there are some security flaws. While these are pretty bad they are not insurmountable and hopefully Apple will release updates to address the issues quickly.
#sidechannel #cpu #webbrowser

0 1 0 0
Original post on graz.social

Someone found a clever #sidechannel to abuse #Cloudflare CDN caching to reveal the approximate location (~location of next big datacenter) of #Signal and #Discord users by sending them a message/notification with an image in it that is fetched from the CDN […]

0 2 0 0
Preview
Webinar | Side Channel Attacks: Advanced Hardware Hacking & Countermeasures | LinkedIn We’re launching a series of webinars in collaboration with HandsOn Training, breaking down unique methods used to extract secret keys from embedded systems, beyond traditional hacking techniques. Le...

We’re hosting a webinar on #SideChannel attacks in 2 weeks! 🔵 Learn how to crack cryptographic keys, bypass secure boot, and sidestep firmware protections on various SoC devices.

This session won’t be recorded, so join us live! Register here: www.linkedin.com/events/webin...

0 0 0 0

Hardware #SideChannel attacks like "electromagnetic fault injection" bypass Apple’s chip defenses. The result? Jailbreaks & #malware on iDevices. #Apple needs to rethink its shielding fast. 🛡️

1 1 1 0
Weber et al.'s "No Leakage Without State Change: Repurposing Configurable Cpu Exceptions To Prevent Microarchitectural Attacks"

Weber et al.'s "No Leakage Without State Change: Repurposing Configurable Cpu Exceptions To Prevent Microarchitectural Attacks"

The first #ACSAC2024 #PaperPreview for today is Weber et al.'s work, which shows that existing HW features can be repurposed to stop ongoing #SideChannel #attacks almost immediately by monitoring the victim: www.openconf.org/acs...
#cybersecurity

2 0 0 0

The first #ACSAC2024 #PaperPreview today is Ayoub et al.'s Bluescream, where they investigate how an attacker can manipulate #Bluetooth Low Energy to enable the long-distance EM #sidechannel #attack called Screaming Channels: www.openconf.org/acs...
#potatosecurity

0 0 0 0