You're at: Home » Browse » Congress » 2012 » Hash-flooding DoS reloaded: attacks and defenses

Hash-flooding DoS reloaded: attacks and defenses



At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET,
Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS
attacks. The vulnerability was then often fixed by adopting stronger hash
functions and “randomizing” them.

Persons:
  • djb
  • Jean-Philippe Aumasson
  • Martin Bo├člet

Top-Clips