Summary

Total Articles Found: 2

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • A Survey of Istio's Network Security Features
  • YubiKey Side-Channel Attack

A Survey of Istio's Network Security Features

Published: 2020-03-04 12:00:00

Popularity: 12

Author: jleadfordncc

Keywords:

  • Cloud & Containerization
  • North American Research
  • Research
  • Istio
  • Kubernetes
  • security analysis
  • service mesh
  • LLM Says: "Secure network gates"

    Istio is a service mesh, which, in general, exist as a compliment to container orchestrators (e.g. Kubernetes) in order to provide additional, service-centric features surrounding traffic management, security, and observability. Istio is arguably the most popular service mesh (using GitHub stars as a metric). This blog post assumes working familiarity with Kubernetes and microservices, but … Continue reading A Survey of Istio's Network Security Features →

    ...more

    YubiKey Side-Channel Attack

    Published: 2024-09-06 15:16:21

    Popularity: 3

    Author: Bruce Schneier

    Keywords:

  • Uncategorized
  • academic papers
  • cloning
  • security analysis
  • security tokens
  • side-channel attacks
  • LLM Says: ""Leaky key""

    There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis.

    ...more

    end