Take note: if I ever proposition you with some free mobile juice via a portable charger, don’t accept.
Over the last month, I’ve created chargers that try to brute force open Android phones by guessing the passcode. Then, with a handy bluetooth chip hidden inside, they let me control the compromised phone’s keyboard from my own Android.
This talk will describe first the landscape of side channel vulnerabilities, the types which are possible given different virtualization circumstances, and the basic primitives of an side-channel attack. This survey will contrast against the specific exploitation of the cloud based environment.
Automotive security is a hot research area but up till now, research has only centered around how to attack with no single complete solution for defense.
Radio timing service, such as GPS, BPC, JJY, WWVB, DCF77, WWVH have been widely used as a basic time source for industry or individual systems. These signals are used by millions of people to synchronize consumer electronic products like wall clocks, clock radios, and wristwatches. NTP sever also use these signals to get a precise time.