Assume, for a moment, that you have a configuration something like this—
Some host, A, is sending queries to, and receiving responses from, a database at C. An observer, B, has access to the packets on the wire, but neither the host nor the server. All the information between the host and the server is encrypted. There is nothing the observer, B, can learn about the information being carried between the client and the server? Given the traffic is encrypted, you might think… “not very much.”
A recent research paper published at CCS ’16 in Vienna argues the observer could know a lot more. In fact, based on just the patterns of traffic between the server and the client, given the database uses atomic operations and encrypts each record separately, it’s possible to infer the key used to query the database (not the cryptographic key). The paper can be found here. Specifically:
We then develop generic reconstruction attacks on any system supporting range queries where either access pattern or communication volume is leaked. These attacks are in a rather weak passive adversarial model, where the untrusted server knows only the underlying query distribution. In particular, to perform our attack Continue reading
It joins the club of telco equipment makers seeking top IT talent.
The company needs to embrace open source and analytics to thrive.
It can't do 'zero to 60' but it can rev up the IoT network edge.
Because NFV is just too complicated for end users.
AWS now offers a DDOS service. Some non-specific thinking out loud on what this means.
The post AWS Shield – Managed DDoS Protection appeared first on EtherealMind.
The post Worth Reading: Navigating the Pentest World appeared first on 'net work.
You get agility through cloud by making the cloud self-service.