New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks
Security researchers have outlined a new technique that renders a remote timing-based side-channel attack more effective regardless of the network congestion between the adversary and the target server. Remote timing attacks that work over a network connection are predominantly affected by variations in network transmission time (or jitter), which, in turn, depends on the load of the network
from The Hacker News https://ift.tt/2Xe8zfg
from The Hacker News https://ift.tt/2Xe8zfg
Comments
Post a Comment