Shuttle Docs
  • Trusted Execution Environments
    • Confidentiality
    • Execution Integrity
    • Remote Attestation
    • Threat Models
    • Side-Channel Attacks
    • Side-Channel Attack Mitigation
    • Model Types
  • Foreword
    • Shuttle
  • Solution #1
    • Blockchain | Framework Alignment
    • Enarx
    • Web Assembly System Interface(WASI)
  • Solution #2
    • Attestation
      • SGX DCAP
      • Intel Trust Authority
    • Decentralizing Attestation
      • It’s Butterfree!
      • Decentralized Public Key Infrastructure(DPKI)
      • Our Tool: Cryptographic Accumulator
      • Re-attestation
  • Blockchain
    • Reducing Computational Overhead
    • Ekiden
    • Verifier's Dilemma
    • Independent Layers
    • Security of Enclaves & Consensus
    • Non-Byzantine Computation
      • Discrepancy Detection - Good Idea Oasis!
    • Roughtime
  • Avalanche
    • Multi-dimensional Fees
    • Stakeless?
  • Privacy
    • Confidential Blockchain
    • Secret Network Vulnerability - 2022
  • Summary
    • Market Potential
    • Cosmos, Polkadot, Avalanche
Powered by GitBook
On this page
  1. Trusted Execution Environments

Side-Channel Attacks

In computer security, a side-channel attack exploits additional information that can be gathered due to the inherent characteristics of how a computer protocol or algorithm is implemented. Unlike attacks that target flaws in the design of the protocol or algorithm itself, such as those identified through cryptanalysis, side-channel attacks leverage unintended information leaks. These leaks can stem from various sources, including timing details, power usage, electromagnetic emissions, and sound.

PreviousThreat ModelsNextSide-Channel Attack Mitigation

Last updated 6 months ago