academic papers, cloning, security analysis, Security technology, security tokens, side-channel attacks, Uncategorized			
			
	
		
	
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s username and password, and physical access to their YubiKey—as well as some technical expertise and equipment. Still, nice piece of security analysis. Powered by WPeMatico
