MIT researchers devise a way to evaluate cybersecurity methods

A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory. Security approaches that completely block these “side-channel attacks” are so computationally expensive that they aren’t feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker’s ability to learn secret information.      To help engineers and scientists better understand the effectiveness of different obfuscation schemes, MIT researchers created a…

This content is for Member members only.
Log In Register