I wonder to what extent these attacks can be mitigated by the addition of “noise” in the form of concurrent/interleaved computational loads, analogous to how fuzzy fonts can be used mitigate TEMPEST radiation-based information leakage ( https://www.mdpi.com/2076-3417/10/8/2828/html ).
Obviously this would necessitate a security/performance trade-off.
No comments yet.