YoVDO

CTX - Eliminating BREACH with Context Hiding

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Web Application Security Courses

Course Description

Overview

Explore a comprehensive analysis of the BREACH attack and its ongoing threat to web application security in this 46-minute Black Hat conference talk. Delve into the attack methodology, defense strategies, and the innovative CTX architecture designed to eliminate BREACH vulnerabilities. Learn about cross-compression examples, alignment issues, and permutations as presented by experts Aggelos Kiayias, Dimitris Karakostas, Dionysis Zindros, and Eva Sarafianou. Gain insights into the origins of the attack, secret management, and practical solutions for implementing context hiding. Discover key takeaways on improving web application security against compression-based attacks and explore open-source libraries and encodings that can help mitigate these risks.

Syllabus

Introduction
Crime
Roger
Attack Methodology
Attack Diagram
Defense
Origin
Secrets
Cross Compression Example
Cross Compression Solutions
Alignment
Example
Permutations
Comparison
Origins
Response Size
Response Size Diagram
CTX Architecture
How does it work
Open Source
Libraries
Encodings
Key takeaways
Questions


Taught by

Black Hat

Related Courses

Authentication & Authorization: OAuth
Udacity
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Hacking and Patching
University of Colorado System via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera