Difference between revisions of "Side-channel attacks"

From wikieduonline
Jump to navigation Jump to search
 
(12 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
{{Draft}}
 
{{Draft}}
  
 +
* [[Spectre]] (2018)
 +
* [[Meltdown]] (2018)
 +
* [[Rambleed]]
  
  
  
[[OpenSSH]] 8.1, [[OpenSSH changelog|released in October 2019]] added in [[ssh]], [[sshd] and [[ssh-agent]] protection for [[private key]]s at rest in RAM against speculation and memory side-channel attacks like [[Spectre]], [[Meltdown]] and [[Rambleed]].
+
[[OpenSSH]] 8.1, [[OpenSSH changelog|released in October 2019]] added in [[ssh]], [[sshd]] and [[ssh-agent]] protection for [[private key]]s at rest in RAM against speculation and memory side-channel attacks like [[Spectre]], [[Meltdown]] and [[Rambleed]].
  
 +
== Related terms ==
 +
* [[Speculation-based attacks]]
 +
* [[Intel]], [[AMD]]
 +
* [[SGX]]
  
 
== See also ==
 
== See also ==
* {{Security}}
+
* {{Side-channel attacks}}
 +
* {{Intel}}
  
[[Category:Security]]
+
[[Category:IT Security]]

Latest revision as of 10:23, 15 August 2021

wikipedia:Side-channel_attack

This article is a Draft. Help us to complete it.


OpenSSH 8.1, released in October 2019 added in ssh, sshd and ssh-agent protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed.

Related terms[edit]

See also[edit]

Advertising: