top | item 36043950

(no title)

admash | 2 years ago

I wonder to what extent these attacks can be mitigated by the addition of “noise” in the form of concurrent/interleaved computational loads, analogous to how fuzzy fonts can be used mitigate TEMPEST radiation-based information leakage ( https://www.mdpi.com/2076-3417/10/8/2828/html ).

Obviously this would necessitate a security/performance trade-off.

discuss

order

No comments yet.