timing attacks vs hash tables
- Added on 2023-08-13
- Page: http://www.tedunangst.com/flak/post/timing-attacks-vs-hash-tables
- See on Internet Archive
- #security #time-attack
First, start with there are no good constant-time data structures. After reading the HN thread, I wanted to see if the attack was truly viable. Can we recovery a JSESSIONID? My previous efforts attacking Lua took a slightly different tack.