Artwork

Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Ariel Waissbein: Timing attacks for recovering private entries from database engines

1:01:54
 
Del
 

Manage episode 153226766 series 1085097
Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Dynamic content for Web applications is typically managed through database engines, including registration information, credit cards medical records and other private information. The web applications typically interface with web users and allow them to make only certain queries from the database while they safeguard the privacy where expected, for example, they may allow to add data in a column of the database but not to view the complete contents of this column. We will describe a new technique that allows executing a timing attack which recovers entries from a private column in a database and only requires the ability to insert data in this private column. During the presentation, we will show the experiments that lead us to developing exploit code for the MySQL engine that demonstrates this technique, give details for the audience to understand the underlying algorithm, analyze the results and discuss future work. We will also discuss how to protect from or detect this exploit.
  continue reading

89 episoder

Artwork
iconDel
 
Manage episode 153226766 series 1085097
Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Dynamic content for Web applications is typically managed through database engines, including registration information, credit cards medical records and other private information. The web applications typically interface with web users and allow them to make only certain queries from the database while they safeguard the privacy where expected, for example, they may allow to add data in a column of the database but not to view the complete contents of this column. We will describe a new technique that allows executing a timing attack which recovers entries from a private column in a database and only requires the ability to insert data in this private column. During the presentation, we will show the experiments that lead us to developing exploit code for the MySQL engine that demonstrates this technique, give details for the audience to understand the underlying algorithm, analyze the results and discuss future work. We will also discuss how to protect from or detect this exploit.
  continue reading

89 episoder

כל הפרקים

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning