YoVDO

Prefix Siphoning - Exploiting LSM-Tree Range Filters for Information Disclosure

Offered By: USENIX via YouTube

Tags

USENIX Annual Technical Conference Courses Cybersecurity Courses Timing Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into a novel key disclosure timing attack on LSM-tree based key-value stores. Learn about "prefix siphoning," a technique that exploits range filters like SuRF and prefix Bloom filter to reveal key information through benign queries. Understand how this attack circumvents read access controls and poses a security threat by identifying prefixes or even full keys in scenarios where brute force methods are impractical. Gain insights into the security implications of optimizing LSM-tree range queries and the potential vulnerabilities in key-value store mechanisms.

Syllabus

USENIX ATC '23 - Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure


Taught by

USENIX

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network