Timing Attacks reviewed using Machine Learning

Very cool write-up. I’ve always been dubious about timing string comparisons as they often end in strcmp and friends, which work word by word on x86(_64) and ARM. Clearly not for Python!

Technique will also be broadly applicable to other timing analysis. Very cool!

Leave a Reply

Your email address will not be published. Required fields are marked *