With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure cyberspace, hackers are trying to research various attack vectors to penetrate them, ultimately rendering them somewhat useless, if things go wrong (which go wrong every now and then). Apart from usual attack vectors in software, hackers have started exploiting the hardware side of computing infrastructure; which has given birth to some famous attacks (e.g. Meltdown, Spectre, Fan-smitter). This paper presents yet another attack vector named Temp-smitter, which uses the temperature pattern of CPU dice as a transmission medium to leak data covertly. The paper talks about the motivation behind the research, design, and analysis of the covert channels, challenges, and possible countermeasures against it.
Speaker: Adhokshaj mishra