Researchers devise new way to evaluate cybersecurity methods

Credit: Unsplash/CC0 Public Domain

A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.

Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world…

Continue Reading


News Source: techxplore.com


Posted

in

by

Tags: