Attackers Can Syphon Crypto Keys with Newly Discovered Attack

June 20, 2022 • by Marc Airhart

Hertzbleed takes advantage of a thermostat-like mechanism that processors use to run programs as quickly as possible without overheating

Computer chip sitting on a motherboard

Photo by alerkiv on Unsplash.


Share


A fist is superimposed on the ghostly outline of an open palm.

Department of Computer Science

Adaptive Anatomy: 3D Models That Fit Every Form

A man holds a microphone and speaks to a group, in front of a banner that reads "Good Systems: A UT Grand Challenge Designing AI technologies that benefit society is our grand challenge" and a slide titled "AI systems that understand what humans want" as a cartoon girl's thought bubble reads "hidden state" and arrows pointing to the words dataset and estimate of hidden state are labeled "human input by psychological process" and "inverse algorithm derived from model of psychological process"

UT Bridging Barriers

Cross-Cutting Edge: Good Systems Scholar Refines Alignment Research

A photo of scientists observing protein structures shown on a digital display.

Announcements

UT Doubles Size of Powerful AI Computing Hub