DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics

DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics

Black Hat via YouTube Direct link

Substring/Superstring Problem

13 of 21

13 of 21

Substring/Superstring Problem

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

DBREACH - Database Reconnaissance and Exfiltration via Adaptive Compression Heuristics

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Roadmap
  3. 3 Encryption Security
  4. 4 CRIME BREACH
  5. 5 MariaDB/InnoDB Encryption and Compression
  6. 6 InnoDB Page Compression
  7. 7 Supported Compression Algorithms
  8. 8 Threat Model
  9. 9 Attack Algorithm
  10. 10 Compressibility Scores
  11. 11 Decision Attack Is a guess in the table?
  12. 12 Character-by-Character Extraction
  13. 13 Substring/Superstring Problem
  14. 14 Addressing the Superstring Problem
  15. 15 Overcoming Noise in the Side Channel
  16. 16 Maximizing Efficiency
  17. 17 Efficiency & Speed
  18. 18 Accuracy
  19. 19 Vulnerability of Other Systems
  20. 20 Prevention
  21. 21 Patching the Vulnerability

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.