Friday, 31 July 2020

New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

Security researchers have outlined a new technique that renders a remote timing-based side-channel attack more effective regardless of the network congestion between the adversary and the target server. Remote timing attacks that work over a network connection are predominantly affected by variations in network transmission time (or jitter), which, in turn, depends on the load of the network

from The Hacker News https://ift.tt/2Xe8zfg
via https://ifttt.com/ IFTTT

No comments:

Post a Comment