Summary

Total Articles Found: 1

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • YubiKey Side-Channel Attack

YubiKey Side-Channel Attack

Published: 2024-09-06 15:16:21

Popularity: 3

Author: Bruce Schneier

Keywords:

  • Uncategorized
  • academic papers
  • cloning
  • security analysis
  • security tokens
  • side-channel attacks
  • LLM Says: ""Leaky key""

    There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis.

    ...more

    end