Chongzhi Zhao

grep -ir "fear" /life &> /dev/null

View on GitHub

Background

Problems

Insights

2 Key operations: set the system in a specific state » measure the duration of a certain memory access. Perform them for every probed address.

We only need 1 measurement without interruption.

Attack Model

Implementation

Takeaway

Questions