Italų IT saugos kompanijos HWG paskaita (EN)
2021-10-18 18:10
val.
Zoom
Speaker: Andrei Munteanu - HWG s.r.l.
Title: Vulnerabilities of security protocols, from design to implementation
Security protocols are used extensively every day and aim to secure communications over public or unsecured networks. The standard objectives of the security protocols are:
Unfortunately, such protocols are often flawed, and such flaws can be exploited by malicious threats actors to achieve their malicious goals. In this lesson we will present flaws and vulnerabilities of security protocols at different layers: design, software implementation, and hardware implementation.
Design vulnerabilities result from a fundamental mistake or oversight in the protocol design. Software implementation vulnerabilities arise from errors in software implementation. Hardware implementation vulnerabilities arise from physical constraints (such as power consumption, temperature) within the hardware implementation. Therefore, for each level we will present attacks that can prevent security protocols from achieving their goals.
Zoom link: https://liedm.zoom.us/j/6872133370
Title: Vulnerabilities of security protocols, from design to implementation
Security protocols are used extensively every day and aim to secure communications over public or unsecured networks. The standard objectives of the security protocols are:
- to preserve the confidentiality and integrity of the data;
- guarantee authenticity;
- guarantee anonymous communications;
- protection from repudiation.
Unfortunately, such protocols are often flawed, and such flaws can be exploited by malicious threats actors to achieve their malicious goals. In this lesson we will present flaws and vulnerabilities of security protocols at different layers: design, software implementation, and hardware implementation.
Design vulnerabilities result from a fundamental mistake or oversight in the protocol design. Software implementation vulnerabilities arise from errors in software implementation. Hardware implementation vulnerabilities arise from physical constraints (such as power consumption, temperature) within the hardware implementation. Therefore, for each level we will present attacks that can prevent security protocols from achieving their goals.
Zoom link: https://liedm.zoom.us/j/6872133370
-
- Puslapio administratoriai:
- Milda Mockūnaitė-Vitkienė
- Kristina Lazickienė
- Neda Černiauskaitė
- Ugnė Daraškevičiūtė