Security Highlight

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Security Highlight: Back in the Driver’s Seat

Security Highlight: Back in the Driver’s Seat

How a Fault Injection compromised a vehicle's autopilot system as showcased by TU Berlin experts at the CCC conference.
Security Highlight: The practical implications of RowPress

Security Highlight: The practical implications of RowPress

Uncover the technical details, practicality, and potential risks associated with RowPress.
Security Highlight: The Rise of the BLOC Cipher

Security Highlight: The Rise of the BLOC Cipher

Axel Posschmann's presentation at CARDIS 2023 explores the impact of geopolitical shifts on cryptography development, emphasizing the acceleration of the formation of blocs due to concerns over ...
Security Highlight: CPU Fuzzing

Security Highlight: CPU Fuzzing

We look at the recent publication in the growing field of pre-silicon security analysis, particularly in CPU fuzzing.
Security Highlight: You may be leaking secrets if you don’t keep your pace

Security Highlight: You may be leaking secrets if you don’t keep your pace

At the recent CHES conference in Prague a team from Karlsruhe Institute of Technology reported a new side channel and a successful attack.
Security Highlight: The Impact of Zenbleed

Security Highlight: The Impact of Zenbleed

In this blog post we discuss the recent hardware vulnerability in AMD Zen 2 processors.
Security Highlight: Stretching local attacks too far

Security Highlight: Stretching local attacks too far

We take a closer look at the recent research that attempted to convert one side channel to another.
Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

Security Highlight: Unveiling EM Eye – a new vulnerability in embedded cameras

This security highlight discusses the recent EM Eye vulnerability discovery, its practical implications, challenges, and potential countermeasures.
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities

We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Security Highlight: Back in the Driver’s Seat

Security Highlight: Back in the Driver’s Seat

How a Fault Injection compromised a vehicle's autopilot system as showcased by TU Berlin experts at the CCC conference.
Security Highlight: The practical implications of RowPress

Security Highlight: The practical implications of RowPress

Uncover the technical details, practicality, and potential risks associated with RowPress.
Security Highlight: The Rise of the BLOC Cipher

Security Highlight: The Rise of the BLOC Cipher

Axel Posschmann's presentation at CARDIS 2023 explores the impact of geopolitical shifts on cryptography development, emphasizing the acceleration of the formation of blocs due to concerns over ...
Security Highlight: CPU Fuzzing

Security Highlight: CPU Fuzzing

We look at the recent publication in the growing field of pre-silicon security analysis, particularly in CPU fuzzing.
Security Highlight: You may be leaking secrets if you don’t keep your pace

Security Highlight: You may be leaking secrets if you don’t keep your pace

At the recent CHES conference in Prague a team from Karlsruhe Institute of Technology reported a new side channel and a successful attack.
Security Highlight: The Impact of Zenbleed

Security Highlight: The Impact of Zenbleed

In this blog post we discuss the recent hardware vulnerability in AMD Zen 2 processors.
Security Highlight: Stretching local attacks too far

Security Highlight: Stretching local attacks too far

We take a closer look at the recent research that attempted to convert one side channel to another.