L33tdawg: The slides and whitepaper from Bernhard's #HITBGSEC talk is available here: http://gsec.hitb.org/sg2016/sessions/attacking-software-tokens/
Mobile apps that generate on-screen tokens for two-factor authentication can be examined and cloned by malware, a security researcher warns.
Fraudsters and crooks can take these clones and generate the codes necessary to login into bank accounts and other online services as their victims.
This talk will describe first the landscape of side channel vulnerabilities, the types which are possible given different virtualization circumstances, and the basic primitives of an side-channel attack. This survey will contrast against the specific exploitation of the cloud based environment.
Automotive security is a hot research area but up till now, research has only centered around how to attack with no single complete solution for defense.
Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.