Loading…
View analytic
Wednesday, October 18 • 14:15 - 15:15
CtF Workshop #3 - Cache me if you can

Log in to save this to your schedule and see who's attending!

Feedback form is now closed.

Hash functions are all around us, being used for a variety of applications such as data integrity verification, de-duplication algorithms and as pointer generators in hash-tables. In this session a security researcher from GE Digital will discuss and demonstrate the differences between cryptographic and none-cryptographic hashes, generating collisions and performing cache poisoning and timing attacks against applications that use hashing naively. 


Attendees could perform the learnt attacks on a pre-configured environment during the workshop.


Workshoppers
avatar for Amit Kaplan

Amit Kaplan

Cyber Security Researcher, GE Digital
BSc in Communication systems engineering from Ben Gurion University of the Negev. Currently work as Cyber Security Resercher. | My main fields of interest are Cryptography and Side-Channel Attacks. And Whisky........


Wednesday October 18, 2017 14:15 - 15:15
Room 37 - CS and Communications Building