Turning Timing Differences into Data Leakage

Michael Schwarz, Daniel Weber
MIC-SEC Paris, France, October 5-9, 2022

# Description

This training provides a hands-on introduction to microarchitectural timing attacks. Participants learn how to identify, measure, and exploit timing differences in modern processors to extract sensitive information. The training covers fundamental concepts like cache architectures and timing primitives, as well as practical attack techniques including cache attacks, Spectre, and Meltdown. Through guided exercises, attendees gain experience in implementing real-world timing attacks and understanding their implications for system security.