Skip to main content

Questions tagged [timing-attack]

For questions about attacking cryptosystems by measuring computation times.

0 votes
0 answers
67 views

I’m working on a reverse-engineering challenge from CTF and I’m trying to figure out the most effective analysis strategy rather than a direct solution. The challenge provides access to a remote ...
Advay Bagaria's user avatar
3 votes
1 answer
147 views

Assume that you are given an input which you want to verify is contained within a Hash Set of secrets. Checking that a value is contained in a Hash Set is not a constant time operation relative to the ...
Najman Husaini's user avatar
4 votes
1 answer
322 views

I am wondering if in theory it is possible to make an estimation of the available CPU cores a server has -- and whether that information could be used as a distinguishing trait to reduce the anonymity ...
O'Niel's user avatar
  • 3,530
2 votes
2 answers
1k views

I am using graphql and my login function is resolved using a promise. The username is an email address. The steps in the logic are the following: - Validate CRSF token else return generic response (&...
U4EA's user avatar
  • 63
4 votes
2 answers
2k views

From other password hashing algorithms, I know that when a user tries to log in, and the account does not exist in the first place, it's best practice to still hash the provided password, so as not to ...
mhutter's user avatar
  • 143
4 votes
1 answer
2k views

I'm currently using PostgreSQL with the pgcrypto extension to store and verify user passwords. When a user logs in, I compare the entered password with the stored hash using the following query: ...
cstff's user avatar
  • 45
2 votes
1 answer
844 views

About timing my question is: How can attack know the time of which certain instructions are performed by the victim? And about the cache, how can attacker know which cache line is being accessed by ...
allexj's user avatar
  • 547
2 votes
0 answers
120 views

I'm new to snort. I'm trying to set up rules in snort to detect the presence of covert timing channels. Ideally, I would like to use pre-made rules like the snort community rules. So far, I've found ...
jaic's user avatar
  • 31
2 votes
0 answers
91 views

I'm using Rust to create a program to attempt a timing attack on a network resource (a printer I lost a password to). I'm wired directly into it. What Linux environmental constraints can I optimize to ...
Evan Carroll's user avatar
  • 3,247
1 vote
1 answer
199 views

Context I've been recently looking at UUIDs (mostly v4) and their uses to maybe start using them in some of my apps. I started asking myself some question about security as one does. Then I fell on ...
Stefmachine's user avatar
1 vote
1 answer
294 views

I am using bcrypt.js for basic login. I have found that the below code runs noticeably quicker when no user is found, since it exits immediately, and no check is done on the hash. This could give an ...
Timothy Pulliam's user avatar
0 votes
1 answer
153 views

Premise: When looking up a secret value in a DB (API key, token, maybe username) it's near-impossible to guarantee that the lookup doesn't leak something about the similarity of the candidate value to ...
adam-p's user avatar
  • 125
0 votes
0 answers
182 views

If I have sensitive HTTP routes that could be subject to timing attacks (trying to guess an ID, user, etc.), is there a way without modifying the application code that it could be wrapped with a ...
Nick T's user avatar
  • 3,492
1 vote
2 answers
306 views

I have a application where users can log in by providing a username or email address (both case insensitive) and a password. In the users table in the database, the relevant account information is ...
limitone's user avatar
3 votes
1 answer
289 views

This question is purely theoretical, I have no intention of ever implementing this scheme in practice. I'm familiar with the shortcomings of sleeping as means of mitigating timing attacks. I'm more ...
PhilipRoman's user avatar

15 30 50 per page
1
2 3 4 5 6