Displaying 12 results from an estimated 12 matches for "dawnsong".
2023 Aug 03
2
Packet Timing and Data Leaks
...assumptions about the person typing (touch
typing at so many words per second and then fuzzing the parameters until
words come out).
The I found a paper written back in 2001 talked about using the
interpacket timing in interactive sessions to leak information.
https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf
I'm sure this has been addressed (or dismissed) but I'm looking for the
specific section of code that might deal with this. Any pointers?
Thanks,
Chris
2023 Aug 06
2
Packet Timing and Data Leaks
...person typing (touch typing at so many words
> per second and then fuzzing the parameters until words come out).
>
> The I found a paper written back in 2001 talked about using the interpacket
> timing in interactive sessions to leak information.
> https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf
>
> I'm sure this has been addressed (or dismissed) but I'm looking for the
> specific section of code that might deal with this. Any pointers?
The main issue raised in that paper was that it was trivially detectable
when terminal echo was switched off and s...
2023 Aug 05
1
Packet Timing and Data Leaks
...son typing (touch
> typing at so many words per second and then fuzzing the parameters until
> words come out).
>
> The I found a paper written back in 2001 talked about using the
> interpacket timing in interactive sessions to leak information.
> https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf
>
> I'm sure this has been addressed (or dismissed) but I'm looking for the
> specific section of code that might deal with this. Any pointers?
>
> Thanks,
>
> Chris
Why would any code "deal with this"? What you're describing is a fo...
2023 Aug 06
1
Packet Timing and Data Leaks
...ch typing at so many words
>> per second and then fuzzing the parameters until words come out).
>>
>> The I found a paper written back in 2001 talked about using the interpacket
>> timing in interactive sessions to leak information.
>> https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf
>>
>> I'm sure this has been addressed (or dismissed) but I'm looking for the
>> specific section of code that might deal with this. Any pointers?
>
> The main issue raised in that paper was that it was trivially detectable
> when terminal e...
2003 Nov 23
5
[Bug 763] Add Null packet keepalive option
http://bugzilla.mindrot.org/show_bug.cgi?id=763
Summary: Add Null packet keepalive option
Product: Portable OpenSSH
Version: 3.7p1
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=98460103932386&w=2
OS/Version: All
Status: NEW
Severity: enhancement
2013 May 02
0
[LLVMdev] GSoC Proposal: Inter-Procedure Program Slicing in LLVM
...be a plus. Saying that one or two people use dynamic slicing
isn't all that convincing; saying that x different groups use it,
including y industry groups, would be far more compelling.
To get you started, you may want to look at this paper by Johnson et.
al.:
http://www.cs.berkeley.edu/~dawnsong/papers/2011%20diffslicing_oakland11.pdf.
-- John T.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20130502/c229de22/attachment.html>
2013 Aug 29
2
[LLVMdev] Adding diversity for security (and testing)
...although inter-procedural analysis can improve the call graph results
to make the program even more secure).
I think diversity is a nice thing to have to provide defense in depth,
but I currently think that CFI will provide the most bang for the buck.
-- John T.
[1] http://www.cs.berkeley.edu/~dawnsong/papers/Oakland2013-CCFIR-CR.pdf
[2] http://www.eecs.harvard.edu/~greg/papers/cfiDataSandboxing.pdf
>
> Looking forward to seeing patches!
>
> Nick
>
>
> _______________________________________________
> LLVM Developers mailing list
> LLVMdev at cs.uiuc.edu http:/...
2013 May 02
2
[LLVMdev] GSoC Proposal: Inter-Procedure Program Slicing in LLVM
Hi all,
I had a second thought of the dynamic slicing, as well as the source code
generating.
Firstly, the dynamic slicing is very useful to software community (I'll
illustrate more in the refined proposal later), but it's already
implemented by Swarup and John Criswell from UIUC. The static slicing code
has been released as Giri project in LLVM, and they would kindly release
the dynamic
2013 Aug 28
0
[LLVMdev] Adding diversity for security (and testing)
On 26 August 2013 11:39, Stephen Crane <sjcrane at uci.edu> wrote:
> Greetings LLVM Devs!
>
> I am a PhD student in the Secure Systems and Software Lab at UC
> Irvine. We have been working on adding randomness into code generation
> to create a diverse population of binaries. This diversity prevents
> code-reuse attacks such as return-oriented-programming (ROP) by
>
2013 Aug 26
10
[LLVMdev] Adding diversity for security (and testing)
Greetings LLVM Devs!
I am a PhD student in the Secure Systems and Software Lab at UC
Irvine. We have been working on adding randomness into code generation
to create a diverse population of binaries. This diversity prevents
code-reuse attacks such as return-oriented-programming (ROP) by
denying the attacker information about the exact code layout. ROP has
been used is several high-profile recent
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to, exactly
every 50 ms. IF no data is rea...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to, exactly
every 50 ms. IF no data is rea...