YoVDO

Using Zero to Attack Zero-Knowledge Proof - ZKP PLONK

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Software Vulnerabilities Courses Zero-Knowledge Proofs Courses

Course Description

Overview

Explore a critical vulnerability in a cutting-edge Zero-Knowledge Proof (ZKP) PLONK C++ implementation through this 37-minute Black Hat conference talk. Discover how an attacker can create forged proofs that all verifiers will accept, guided by theoretical insights. Examine the practical execution of the attack as it exploits a chain of perfectly aligned software vulnerabilities. Gain valuable insights into the intersection of cryptographic theory and real-world implementation challenges in ZKP systems.

Syllabus

Using Zero to Attack Zero-Knowledge Proof (ZKP) PLONK


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube