Apple's M1 chip has a vulnerability that can't be fixed without a silicon revision, according to developer Hector Martin. The flaw allows for covert channels that enable two malicious apps to talk to ...
Covert Channel Between the CPU and An FPGA By Modulating The Usage of the Power Distribution Network
use Time-to-Digital Converter sensors to observe these power variations. The sensor circuits are programmed into the FPGA fabric using only standard logic components. Our covert channel achieves a ...
A transfer of information that violates a computer's built-in security systems. A covert storage channel refers to depositing information in a memory or storage location that can be accessed by ...
“To operate efficiently across a wide range of workloads with varying power requirements, a modern processor applies different current management mechanisms, which briefly throttle instruction ...
The peer-to-peer network used by AirTags, Apple's just-released tracking and location devices, could be used by anyone to send small amounts of data, essentially creating a covert channel not limited ...
Researchers bypass Android security mechanisms and exploit smartphone cellular voice channel to act as a new covert channel which can potentially be used to leak information and to spread malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results