Presentation on finding implementation* bugs outside the mainstream (as given at Securi-Tay 2017).
A lot of fantastic work has gone into the discovery, analysis, and (on occasion) marketing of SSL/TLS vulnerabilities. Some, such as BEAST and LUCKY13, are issues in the protocol itself. Other bugs, however, affect individual implementations of this complicated and nuanced protocol. This talk will discuss an approach for identifying security bugs in SSL/TLS server implementations, outside the mainstream well-publicised issues that we all know so well.
Tools referenced in this talk include:
November 16, 2017
MD5 hash: 503a77150111d59a0352c27a62195c4c
|Date:||November 16, 2017|