Главная
Study mode:
on
1
Intro
2
Roadmap
3
Encryption Security
4
CRIME BREACH
5
MariaDB/InnoDB Encryption and Compression
6
InnoDB Page Compression
7
Supported Compression Algorithms
8
Threat Model
9
Attack Algorithm
10
Compressibility Scores
11
Decision Attack Is a guess in the table?
12
Character-by-Character Extraction
13
Substring/Superstring Problem
14
Addressing the Superstring Problem
15
Overcoming Noise in the Side Channel
16
Maximizing Efficiency
17
Efficiency & Speed
18
Accuracy
19
Vulnerability of Other Systems
20
Prevention
21
Patching the Vulnerability
Description:
Explore a groundbreaking presentation on database security vulnerabilities in this 36-minute Black Hat conference talk. Delve into the world of compression side-channel attacks on real-world databases, focusing on the DBREACH (Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics) technique. Learn how attackers can potentially extract encrypted content inserted by other users, exploiting the dangerous combination of encryption and compression in large databases. Discover the intricacies of InnoDB page compression, supported compression algorithms, and the threat model behind these attacks. Gain insights into the attack algorithm, compressibility scores, and character-by-character extraction methods. Explore challenges such as the substring/superstring problem and techniques for overcoming noise in the side channel. Examine the efficiency, speed, and accuracy of the attack, as well as its potential impact on other systems. Conclude with a discussion on prevention strategies and patching vulnerabilities to enhance database security. Read more

DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics

Black Hat
Add to list
0:00 / 0:00