May 7, 2025
Trending News

Vulnerabilities discovered in fingerprint sensors and crypto wallets

  • July 16, 2022
  • 0

Security experts from the Ruhr Institute of Software Technology paluno at the University of Duisburg-Essen (UDE) have developed a new technique that allows for the first time to

Security experts from the Ruhr Institute of Software Technology paluno at the University of Duisburg-Essen (UDE) have developed a new technique that allows for the first time to test the dimming of protected parts of memory in modern processors.

As reported by Ukrinform with reference to techxplore, this method exposed many vulnerabilities in critical security software.

“Thanks to modern phasing technology, the researchers were able to detect many previously unknown security issues. All fingerprint drivers tested as well as wallets used to store cryptocurrency were also affected, the report said.

Thus, hackers can exploit these vulnerabilities to read biometric data or steal the entire balance of the stored cryptocurrency.

It was noted that all companies were informed. Added three vulnerabilities to the public CVE directory.

In 2020, Professor Dr. The paluno team, led by Lucas Davi, discovered and published several vulnerabilities in the “Software Protection Extension” (SGX) enclaves.

Now, together with partners from the CASA excellence cluster, the researchers have made another breakthrough in analysis techniques: their latest development enables testing of layout threads that is much more efficient than the symbolic implementation used previously. The idea behind blur testing is to feed a large amount of input into a program to get an idea of ​​the structure of the code.

Intel’s “Software Protection Extension” (SGX) is a widely used technology to protect sensitive data from misuse. This helps developers protect a certain part of the memory from the rest of the computer. For example, a password manager can be run safely in such a residential area even if the rest of the system is compromised by malware.

Source: Ukrinform

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version