7 lines
357 B
Text
7 lines
357 B
Text
|
Security
|
||
|
* An adversary with access to precise enough information about memory
|
||
|
accesses (typically, an untrusted operating system attacking a secure
|
||
|
enclave) could recover an RSA private key after observing the victim
|
||
|
performing a single private-key operation. Found and reported by
|
||
|
Zili KOU, Wenjian HE, Sharad Sinha, and Wei ZHANG.
|