YoVDO

CTX - Eliminating BREACH with Context Hiding

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Web Application Security Courses

Course Description

Overview

Explore a comprehensive analysis of the BREACH attack and its ongoing threat to web application security in this 46-minute Black Hat conference talk. Delve into the attack methodology, defense strategies, and the innovative CTX architecture designed to eliminate BREACH vulnerabilities. Learn about cross-compression examples, alignment issues, and permutations as presented by experts Aggelos Kiayias, Dimitris Karakostas, Dionysis Zindros, and Eva Sarafianou. Gain insights into the origins of the attack, secret management, and practical solutions for implementing context hiding. Discover key takeaways on improving web application security against compression-based attacks and explore open-source libraries and encodings that can help mitigate these risks.

Syllabus

Introduction
Crime
Roger
Attack Methodology
Attack Diagram
Defense
Origin
Secrets
Cross Compression Example
Cross Compression Solutions
Alignment
Example
Permutations
Comparison
Origins
Response Size
Response Size Diagram
CTX Architecture
How does it work
Open Source
Libraries
Encodings
Key takeaways
Questions


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network