Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from USENIX Security '23 that delves into the vulnerabilities of Chrome's password leak detection protocol. Learn about microarchitectural side-channel attacks that compromise the security properties of this protocol, designed to protect users from credential stuffing attacks. Discover new techniques that enable practical attacks on the memory-hard hash function scrypt, allowing attackers to recover user passwords with a single guess in dictionary attacks. Examine a novel cryptanalysis of the Binary Extended Euclidian Algorithm (BEEA) that extracts inputs from a single, noisy trace, potentially exposing client password information to malicious servers. Gain insights into the challenges of implementing secure password checking mechanisms on modern computers and the importance of addressing side-channel vulnerabilities in cryptographic protocols.