YoVDO

Prefix Siphoning - Exploiting LSM-Tree Range Filters for Information Disclosure

Offered By: USENIX via YouTube

Tags

USENIX Annual Technical Conference Courses Cybersecurity Courses Timing Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into a novel key disclosure timing attack on LSM-tree based key-value stores. Learn about "prefix siphoning," a technique that exploits range filters like SuRF and prefix Bloom filter to reveal key information through benign queries. Understand how this attack circumvents read access controls and poses a security threat by identifying prefixes or even full keys in scenarios where brute force methods are impractical. Gain insights into the security implications of optimizing LSM-tree range queries and the potential vulnerabilities in key-value store mechanisms.

Syllabus

USENIX ATC '23 - Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure


Taught by

USENIX

Related Courses

Amazon DynamoDB - A Scalable, Predictably Performant, and Fully Managed NoSQL Database Service
USENIX via YouTube
Faasm - Lightweight Isolation for Efficient Stateful Serverless Computing
USENIX via YouTube
AC-Key - Adaptive Caching for LSM-based Key-Value Stores
USENIX via YouTube
The Future of the Past - Challenges in Archival Storage
USENIX via YouTube
A Decentralized Blockchain with High Throughput and Fast Confirmation
USENIX via YouTube