An innovative cyberattack technique known as “Hot Pixel,” which targets the complex interactions between graphic processing units (GPUs), contemporary system-on-a-chip (SoC), and browser data, has been discovered through a historic partnership between the University of Michigan, Ruhr University Bochum, and Georgia Tech.
The “Hot Pixel” attack varies from conventional security flaws, as it bypasses modern side-channel defences by taking advantage of data-dependent computation cycles in GPUs and SoCs to steal information from Chrome and Safari browsers.
The inherent difficulties that contemporary processors have in managing power consumption and heat dissipation, especially at high execution rates, served as the foundation for the researchers’ finding. This disproportion generates a distinct digital fingerprint that can be recognised and examined.
By removing pixels from the content being displayed in the target’s browser, the “Hot Pixel” attack takes advantage of these peculiarities to deduce a device’s navigation history. The attackers were able to quickly determine the data being proce
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: