-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Platform
all
### App version
any
### Feature
It would also be nice if there were timing mitigations so tha…
-
**Description**
the original used several bitmaps to decide when attacks happen, when to animate what and so on. Should also fix arrows sometimes appearing behind the shooter (APR > 1).
* combat…
-
> Marvin Attack: potential key recovery through timing sidechannels
| Details | |
| ------------------- | ---------------------------------…
-
> Marvin Attack: potential key recovery through timing sidechannels
| Details | |
| ------------------- | ---------------------------------…
-
it's better if verify and decode are affectful, as a sign, to show that jsonwebtoken lib is protected against timing attacks
-
Size Leaks are very important XS-Leaks. They are often addressed in the browser when researchers find exact ways to leak the size. Some mechanisms that still work:
- [Cache Timing](https://github.c…
-
Currently, s2n balances the number of hash rounds by forcing a second hash compression when needed. This is done by hashing one extra block's worth of bytes. This causes extra btyes to be copied, cre…
-
# CPU Cache Side-Channel Attacks: Meltdown & Spectre | Guanzhou (Jose) Hu
One of the most dangerous kinds of security attacks is side-channel attacks since they are not part of the designed threat mo…
-
Can be used to detect browser activity,
Allows more ways to leak data from other origins.
```js
let old;
for(;;) {
let start = performance.now();
let time = performance.now() - start;
if (time …
-
We should have a document describing the intended threat model that liboqs aims to be secure against. This would include issues such as constant time behaviour, and what is in or out of scope, such as…