BOOK THIS SPACE FOR AD
ARTICLE ADYubiKey Side-Channel Attack
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment.
Still, nice piece of security analysis.
Tags: academic papers, cloning, security analysis, security tokens, side-channel attacks
Subscribe to comments on this entry
Leave a comment
All comments are now being held for moderation. For details, see this blog post.
LoginName
URL:
Remember personal info?
Fill in the blank: the name of this blog is Schneier on ___________ (required):
Comments:
Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/
Sidebar photo of Bruce Schneier by Joe MacInnis.