Introduction to Side Channel Attacks using CacheWarp
Manage episode 435214259 series 3594255
In this week's episode we have a very special guest, Michael Schwarz from CISPA. A security researcher specialized in CPU side-channel attacks. He explains how side-channel attacks work in general, but most specifically with the example of his team's most recent find: #CacheWarp. He was also involved in the finding of #Meltdown and #Spectre.
In this episode of Cloud Commute, Chris and Michael discuss:
- Understanding side-channel attacks and their impact on cloud security
- The role of CISPA in cybersecurity research and startup support
- CacheWarp: A CPU vulnerability that enables privilege escalation
- The future of hardware vulnerabilities and increasing complexity in CPUs
Interested to learn more about the cloud infrastructure stack like storage, security, and Kubernetes? Head to our website (www.simplyblock.io/cloud-commute-podcast) for more episodes, and follow us on LinkedIn (www.linkedin.com/company/simplyblock-io). You can also check out the detailed show notes on Youtube (www.youtube.com/watch?v=fLUSrcah2xE).
You can find Michael Schwarz on X @misc0110 and Linkedin: /michael-schwarz-5aaab720.
About simplyblock:
Simplyblock is an intelligent database storage orchestrator for IO-intensive workloads in Kubernetes, including databases and analytics solutions. It uses smart NVMe caching to speed up read I/O latency and queries. A single system connects local NVMe disks, GP3 volumes, and S3 making it easier to handle storage capacity and performance. With the benefits of thin provisioning, storage tiering, and volume pooling, your database workloads get better performance at lower cost without changes to existing AWS infrastructure.
π Get started with simplyblock: https://www.simplyblock.io/buy-now
πͺ simplyblock AWS Marketplace: https://aws.amazon.com/marketplace/seller-profile?id=seller-fzdtuccq3edzm
37 episodes