dcsimg
June 16, 2019
Hot Topics:

More articles by Razvan Peteanu

razvan.peteanu@home.com

Zen and the Art of Breaking Security - Part II

There are cases in which "gentle" techniques like timing or power analyses are not enough to fulfill the attacker's goal. Or the goal itself is not to break the protection scheme but to break through it, to the end target the mechanism is protecting, in a modern reenactment of Alexander the Great's "solution" to the Gordian knot. Enter failure-inducing attacks, in which the technique is to induce a failure in the very protection mechanism itself.

Zen and the Art of Breaking Security - Part II

There are cases in which "gentle" techniques like timing or power analyses are not enough to fulfill the attacker's goal. Or the goal itself is not to break the protection scheme but to break through it, to the end target the mechanism is protecting, in a modern reenactment of Alexander the Great's "solution" to the Gordian knot. Enter failure-inducing attacks, in which the technique is to induce a failure in the very protection mechanism itself.

URL, URL, Little Do We Know Thee

URLs have associated security implications. "Interesting" ways of using them have been known by spammers for a while, but now the Microsoft Knowledge Base spoof and the February issue of Crypto-Gram have made the Internet community more aware of what URLs can do.

Zen and the Art of Breaking Security - Part I

Designing a secure solution, be it a protocol, algorithm or enterprise architecture, is far from trivial. Apart from the technical or scientific difficulties to overcome, there is a mental trap easy to fall into: looking at the picture through the eyes of the designer. This first of a two part series from Security Portal looks at alternative, perhaps even unusual, means to induce or exploit security vulnerabilities.

Zen and the Art of Breaking Security - Part I

Designing a secure solution, be it a protocol, algorithm or enterprise architecture, is far from trivial. Apart from the technical or scientific difficulties to overcome, there is a mental trap easy to fall into: looking at the picture through the eyes of the designer. This first of a two part series from Security Portal looks at alternative, perhaps even unusual, means to induce or exploit security vulnerabilities.

Enterprise Development Update

Don't miss an article. Subscribe to our newsletter below.


Thanks for your registration, follow us on our social networks to keep up-to-date