Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting the Not So Misuse-Resistant AES-GCM API of OpenSSL

NorthSec via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the security vulnerabilities in OpenSSL's AES-GCM API implementation in this 31-minute conference talk from NorthSec 2026. Learn how AES-GCM encryption, while theoretically robust, can be compromised through poor API design that lacks misuse resistance, allowing attackers to alter encrypted ciphertext content. Discover the fundamental concepts of AES-GCM encryption and understand what conditions are necessary to compromise its integrity properties. Examine real-world examples where cryptography APIs were implemented without considering misuse resistance, particularly focusing on OpenSSL's implementation used in browsers and programming languages like Ruby and PHP. Master techniques for detecting these API misuses and learn practical exploitation methods for various real-life scenarios. Understand how different usage patterns of AES-GCM create different attack vectors and discover the specific techniques that can be leveraged to exploit these vulnerabilities. Bridge the gap between cryptographic theory and practical implementation challenges, illustrating why secure cryptographic implementations require careful consideration beyond theoretical soundness.

Syllabus

NorthSec 2026 - Félix Charette - Exploiting the not so misuse-resistant AES-GCM API of OpenSSL

Taught by

NorthSec

Reviews

Start your review of Exploiting the Not So Misuse-Resistant AES-GCM API of OpenSSL

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.