Launch a New Career with Certificates from Google, IBM & Microsoft
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a conference talk that delves into a novel key disclosure timing attack on LSM-tree based key-value stores. Learn about "prefix siphoning," a technique that exploits range filters like SuRF and prefix Bloom filter to reveal key information through benign queries. Understand how this attack circumvents read access controls and poses a security threat by identifying prefixes or even full keys in scenarios where brute force methods are impractical. Gain insights into the security implications of optimizing LSM-tree range queries and the potential vulnerabilities in key-value store mechanisms.
Syllabus
USENIX ATC '23 - Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure
Taught by
USENIX