Timing Attacks for Recovering Private Entries From Database Engines
نویسندگان
چکیده
Dynamic content for Web applications is typically managed through database engines, including registration information, credit cards medical records and other private information. The web applications typically interface with web users and allow them to make only certain queries from the database while they safeguard the privacy where expected, for example, they may allow to add data in a column of the database but not to view the complete contents of this column. We will describe a new technique that allows executing a timing attack which recovers entries from a private column in a database and only requires the ability to insert data in this private column. During the presentation, we will show the experiments that led us to developing exploit code for the MySQL engine that demonstrates this technique, give details for the audience to understand the underlying algorithm, analyze the results and discuss future work. We will also discuss how to protect from or detect
منابع مشابه
Improving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملTemplate attacks exploiting static power and application to CMOS lightweight crypto-hardware
Side-channel attacks are a serious threat to security-critical software. OpenSSL is a prime security attack target due to the library’s ubiquitous real world applications, therefore, the history of cache-timing attacks against OpenSSL is varied and rich. The presentation includes a brief history of cache-timing attacks in OpenSSL. To mitigate remote timing and cache-timing attacks, many ubiquit...
متن کاملConstant-Time Callees with Variable-Time Callers
Side-channel attacks are a serious threat to securitycritical software. To mitigate remote timing and cachetiming attacks, many ubiquitous cryptography software libraries feature constant-time implementations of cryptographic primitives. In this work, we disclose a vulnerability in OpenSSL 1.0.1u that recovers ECDSA private keys for the standardized elliptic curve P-256 despite the library feat...
متن کاملOptimal Integral State Feedback Control of HCCI Combustion Timing
Homogenous Charge Compression Ignition (HCCI) engines hold promise of high fuel efficiency and low emission levels for future green vehicles. But in contrast to gasoline and diesel engines, HCCI engines suffer from lack of having direct means to initiate combustion. A combustion timing controller with robust tracking performance is the key requirement to leverage HCCI application in production ...
متن کاملNumerical study of the effect of fuel injection timing on the ignition delay, performance parameters and exhaust emission of gas/dual fuel diesel engine using Computational Fluid Dynamics
Today, due to the various usage of compression ignition engines in urban transportation, as well as the need to reduce exhaust emissions and control fuel consumption, the use of alternative fuels has become common in diesel engines. Gaseous fuel is one of the most common alternative fuels that can be used in diesel engines. The utilization of alternative fuels in compression ignition engines re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007