UC San Diego Product Management Certificate — AI-Powered PM Training
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the world of Algorithmic Complexity (AC) vulnerabilities in this 25-minute Black Hat conference talk. Delve into the intricacies of identifying and exploiting inefficient worst-case computational complexities in programs. Learn about the properties, challenges, and real-world implications of AC vulnerabilities through examples, space-time analysis, and demonstrations. Discover the ACSploit tool and its modules for testing and exploiting these vulnerabilities. Gain insights into line breaking techniques and examine a real-world test case with a C implementation. Enhance your understanding of program security beyond simple algorithm implementation knowledge.
Syllabus
Introduction
Examples
What are they
Properties
Spacetime Analysis
Challenges
Modules
Demonstration
Line Breaking
RealWorld Test Case
C Implementation
Taught by
Black Hat