Thwarting the cleverest attackers
Image Credit: Photos.com --- Lee Rannals for RedOrbit.com Researchers have developed a new technique that will be able to keep hackers from stealing a computer's secrets. Hackers have become an increasing problem for keeping personal information secure from cybertheft, but Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science at MIT, and her former student Guy Rothblum believe they have a solution for the growing threat. Goldwasser says the technique could protect devices that use propriety algorithms, so hackers will be unable to reverse-engineer the machines. The researchers' technique obscures the computational details of a program, whether it is running on a personal computer or a server. The system converts a given computation into a sequence of smaller computational models, according to an MIT statement. Data that is fed into the first module is encrypted, and at no point during the module's execution is it decrypted. The encrypted output of the first module is fed into th
In the last 10 years, cryptography researchers have demonstrated that even the most secure-seeming computer is shockingly vulnerable to attack. The time it takes a computer to store data in ...
Tue 1 May 12 from Phys.org
Thwarting the cleverest attackers, Tue 8 May 12 from Science Blog
Thwarting the cleverest attackers, Tue 1 May 12 from Eurekalert
An antivirus program won't stop this: Hackers can steal computer data by listening to the noise your PC makes
The time it takes a computer to store data in memory, fluctuations in its power consumption and even the noises it emits can betray information to a savvy assailant.
Thu 3 May 12 from Daily Mail
Image Credit: Photos.com --- Lee Rannals for RedOrbit.com Researchers have developed a new technique that will be able to keep hackers from stealing a computer's secrets. Hackers have become ...
Thu 3 May 12 from RedOrbit
Thwarting the cleverest attackers: Even most secure-seeming computer is shockingly vulnerable to attack
Savvy hackers can steal a computer's secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.
Tue 1 May 12 from ScienceDaily
- Pages: 1