Top News

Temp-Smitter – Covert Data Transmission over CPU Temperature

With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure cyberspace, hackers are trying to research various attack vectors to penetrate them, ultimately rendering them somewhat useless, if things go wrong (which go wrong every now and then). Apart from usual attack vectors in software, hackers have started exploiting the hardware side of computing infrastructure; which has given birth to some famous attacks (e.g. Meltdown, Spectre, Fan-smitter). This paper presents yet another attack vector named Temp-smitter, which uses a temperature pattern of CPU dice as a transmission medium to leak data covertly. The paper talks about the motivation behind the research, design, and analysis of the covert channels, challenges, and possible countermeasures against it.
Registration Link:
https://forms.gle/YrM6CXvotj43FR8H6

Topic1: Android Hacking Series

Description: This workshop will cover the penetration testing of Mobile applications. We will start from basic pentesting to advance level. In this session we will also cover how to set-up mobile pen testing lab and perform the pentest for mobile applications.
Pre-Requisites: Laptop, Genymotion, Dex2jar, APKTOOL, JGGui, SQLite Browser, Drozer, etc
E3 Topics: Local Storage, Input Validation, Access Control, Content Provider

Duration: 1 Hr
Short Intro of Speaker:
Rinku Kumar is an information security researcher. Having experience in multiple securities domain like Appsec, Network security, Compliance review etc. Have done certification like OSCE, OSCP, CEH, Securecode warrior in different languages.
Sateesh Verma is an Information Security researcher, having around 10 year of experience specially in Web application, Mobile, thick client, API protesting.
Level: Novice, Advanced Beginner, Competent

Topic2:Temp-smitter – Covert Data Transmission over CPU Temperature

Description: With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure the cyber space, hackers are trying to research various attack vectors to penetrate them, ultimately rendering them somewhat useless, if things go wrong (which go wrong every now and then). Apart from usual attack vectors in software, hackers have started exploiting hardware side of computing infrastructure; which has given birth to some famous attacks (e.g. Meltdown, Spectre, Fan-smitter). This paper presents yet another attack vector named Temp-smitter, which uses temperature pattern of CPU dice as transmission medium to leak data covertly. The paper talks about motivation behind the research, design and analysis of covert channel, challenges, and possible countermeasures against it.

Duration: 45 Min – 1 Hr
Short Intro of Speaker: Also Known as DemiGod of Malware.
Level: Proficient

Vapra Shiksha
An initiative for Cybersecurity Talks
Request you all to follow us on the following platforms for regular updates.

https://t.me/VapraShiksha (Central Node for all Info)

Previous ArticleNext Article
Send this to a friend