Displaying 3 results from an estimated 3 matches for "alfardan".
2013 Aug 28
2
[LLVMdev] Adding diversity for security (and testing)
...he NOPs is miniscule. Given how many sessions the latest DTLS attack took [3], even for attackers on the same LAN, and the fact that the difference in timing was in number of blocks to be MAC'd which takes at least two order of magnitude more time than some NOPs (500 to 1000 cycles according to AlFardan and Paterson), I'm doubtful the number of NOPs in even a single sled could be recovered.
For attackers 1 and 3, any PRNG is as good as any other. For 4, I'd be shocked if anything could be recovered using any PRNG (for whatever that's worth). Attacker 2 seems like the only situation wh...
2013 Aug 28
0
[LLVMdev] Adding diversity for security (and testing)
On Mon, Aug 26, 2013 at 9:14 PM, Todd Jackson <quantum.skyline at gmail.com>wrote:
>
> > We would also include a secure random number generator which links
>> > against OpenSSL. This would of course be an optional module disabled
>> > by default, but is necessary so the randomization is cryptographically
>> > secure and useful in security applications.
2013 Aug 27
4
[LLVMdev] Adding diversity for security (and testing)
> > We would also include a secure random number generator which links
> > against OpenSSL. This would of course be an optional module disabled
> > by default, but is necessary so the randomization is cryptographically
> > secure and useful in security applications.
>
> I am not sure why you need this feature. You can provide LLVM with a
> SEED value that can be