New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks

0 Comment

Source: The Hacking News
New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks
Security researchers have outlined a new technique that renders a remote timing-based side-channel attack more effective regardless of the network congestion between the adversary and the target server.

Remote timing attacks that work over a network connection are predominantly affected by variations in network transmission time (or jitter), which, in turn, depends on the load of the network

Leave a Reply

%d bloggers like this: