Evaluating cybersecurity methods

Evaluating cybersecurity methods

2 years ago
Anonymous $pUsIN4hzN9

https://www.sciencedaily.com/releases/2023/06/230628201433.htm

Security approaches that completely block these "side-channel attacks" are so computationally expensive that they aren't feasible for many real-world systems. Instead, engineers often apply what are known as obfuscation schemes that seek to limit, but not eliminate, an attacker's ability to learn secret information.

To help engineers and scientists better understand the effectiveness of different obfuscation schemes, MIT researchers created a framework to quantitatively evaluate how much information an attacker could learn from a victim program with an obfuscation scheme in place.