For example, a side-channel attack on an e-bank, Realbank, which leaks its private key, could enable a fake bank, Badbank, to pretend to be Realbank.
While software isolation mechanisms isolate memory used for different pro-cesses and different VMs, these mechanisms do not isolate the available smartphones.
Cache side-channel attacks thus constitute a serious security problem.
For example, a side-channel attack on an e-bank, Realbank, which leaks its private key, could enable a fake bank, Badbank, to pretend to be Realbank. While software isolation mechanisms isolate memory used for different pro-cesses and different VMs, these mechanisms do not isolate the available smartphones. Cache side-channel attacks thus constitute a serious security problem.
การแปล กรุณารอสักครู่..