search for: dawnsong

Displaying 12 results from an estimated 12 matches for "dawnsong".

2023 Aug 03
2
Packet Timing and Data Leaks
...assumptions about the person typing (touch typing at so many words per second and then fuzzing the parameters until words come out). The I found a paper written back in 2001 talked about using the interpacket timing in interactive sessions to leak information. https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf I'm sure this has been addressed (or dismissed) but I'm looking for the specific section of code that might deal with this. Any pointers? Thanks, Chris
2023 Aug 06
2
Packet Timing and Data Leaks
...person typing (touch typing at so many words > per second and then fuzzing the parameters until words come out). > > The I found a paper written back in 2001 talked about using the interpacket > timing in interactive sessions to leak information. > https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf > > I'm sure this has been addressed (or dismissed) but I'm looking for the > specific section of code that might deal with this. Any pointers? The main issue raised in that paper was that it was trivially detectable when terminal echo was switched off and s...
2023 Aug 05
1
Packet Timing and Data Leaks
...son typing (touch > typing at so many words per second and then fuzzing the parameters until > words come out). > > The I found a paper written back in 2001 talked about using the > interpacket timing in interactive sessions to leak information. > https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf > > I'm sure this has been addressed (or dismissed) but I'm looking for the > specific section of code that might deal with this. Any pointers? > > Thanks, > > Chris Why would any code "deal with this"? What you're describing is a fo...
2023 Aug 06
1
Packet Timing and Data Leaks
...ch typing at so many words >> per second and then fuzzing the parameters until words come out). >> >> The I found a paper written back in 2001 talked about using the interpacket >> timing in interactive sessions to leak information. >> https://people.eecs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf >> >> I'm sure this has been addressed (or dismissed) but I'm looking for the >> specific section of code that might deal with this. Any pointers? > > The main issue raised in that paper was that it was trivially detectable > when terminal e...
2003 Nov 23
5
[Bug 763] Add Null packet keepalive option
http://bugzilla.mindrot.org/show_bug.cgi?id=763 Summary: Add Null packet keepalive option Product: Portable OpenSSH Version: 3.7p1 Platform: All URL: http://marc.theaimsgroup.com/?l=openssh-unix- dev&m=98460103932386&w=2 OS/Version: All Status: NEW Severity: enhancement
2013 May 02
0
[LLVMdev] GSoC Proposal: Inter-Procedure Program Slicing in LLVM
...be a plus. Saying that one or two people use dynamic slicing isn't all that convincing; saying that x different groups use it, including y industry groups, would be far more compelling. To get you started, you may want to look at this paper by Johnson et. al.: http://www.cs.berkeley.edu/~dawnsong/papers/2011%20diffslicing_oakland11.pdf. -- John T. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20130502/c229de22/attachment.html>
2013 Aug 29
2
[LLVMdev] Adding diversity for security (and testing)
...although inter-procedural analysis can improve the call graph results to make the program even more secure). I think diversity is a nice thing to have to provide defense in depth, but I currently think that CFI will provide the most bang for the buck. -- John T. [1] http://www.cs.berkeley.edu/~dawnsong/papers/Oakland2013-CCFIR-CR.pdf [2] http://www.eecs.harvard.edu/~greg/papers/cfiDataSandboxing.pdf > > Looking forward to seeing patches! > > Nick > > > _______________________________________________ > LLVM Developers mailing list > LLVMdev at cs.uiuc.edu http:/...
2013 May 02
2
[LLVMdev] GSoC Proposal: Inter-Procedure Program Slicing in LLVM
Hi all, I had a second thought of the dynamic slicing, as well as the source code generating. Firstly, the dynamic slicing is very useful to software community (I'll illustrate more in the refined proposal later), but it's already implemented by Swarup and John Criswell from UIUC. The static slicing code has been released as Giri project in LLVM, and they would kindly release the dynamic
2013 Aug 28
0
[LLVMdev] Adding diversity for security (and testing)
On 26 August 2013 11:39, Stephen Crane <sjcrane at uci.edu> wrote: > Greetings LLVM Devs! > > I am a PhD student in the Secure Systems and Software Lab at UC > Irvine. We have been working on adding randomness into code generation > to create a diverse population of binaries. This diversity prevents > code-reuse attacks such as return-oriented-programming (ROP) by >
2013 Aug 26
10
[LLVMdev] Adding diversity for security (and testing)
Greetings LLVM Devs! I am a PhD student in the Secure Systems and Software Lab at UC Irvine. We have been working on adding randomness into code generation to create a diverse population of binaries. This diversity prevents code-reuse attacks such as return-oriented-programming (ROP) by denying the attacker information about the exact code layout. ROP has been used is several high-profile recent
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to, exactly every 50 ms. IF no data is rea...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to, exactly every 50 ms. IF no data is rea...