Главная
Study mode:
on
1
Intro
2
Side-Channel Attacks
3
Timing Side-Channels
4
Basic Timing Side-Channel
5
Prior Work!
6
Real Jitter
7
Statistical Methods
8
Why a tool for timing attacks?
9
Goals and Design
10
Optimizations
11
Timing Resolution: Loopback
12
Overview of Results
13
String comparison
14
Microbenchmarks (in nanoseconds)
15
Branching
16
Time-Based Padding Oracle
17
Future Plans
Description:
Explore the practical implications of timing side-channel attacks in web applications through this 50-minute Black Hat conference talk. Delve into the detection and exploitability of timing vulnerabilities in common scenarios, including database queries, message authentication codes, web API keys, OAuth tokens, and login functions. Learn about the 'time trial' tool and gain insights into measuring timing differences remotely across various network environments. Understand the significance of these attacks for defensive security, penetration testing, and research roles. Examine experimental results demonstrating precise timing measurements and their distinguishability in modern web frameworks and servers. Gain a comprehensive update on the state-of-the-art in exploiting timing attacks and evaluate their severity and impact on web application security.

Racing Towards Practical Timing Attacks

Black Hat
Add to list
0:00 / 0:00