Overview
Explore the world of Algorithmic Complexity (AC) vulnerabilities in this 25-minute Black Hat conference talk. Delve into the intricacies of identifying and exploiting inefficient worst-case computational complexities in programs. Learn about the properties, challenges, and real-world implications of AC vulnerabilities through examples, space-time analysis, and demonstrations. Discover the ACSploit tool and its modules for testing and exploiting these vulnerabilities. Gain insights into line breaking techniques and examine a real-world test case with a C implementation. Enhance your understanding of program security beyond simple algorithm implementation knowledge.
Syllabus
Introduction
Examples
What are they
Properties
Spacetime Analysis
Challenges
Modules
Demonstration
Line Breaking
RealWorld Test Case
C Implementation
Taught by
Black Hat