BLACK HAT - New database attack revealed

Presenters to show how ‘timing attacks’ can infiltrate databases

Researchers at Core Security Technologies are to demonstrate an attack that could allow hackers to extract private information from databases -- without requiring any bugs in the database management software.

The demonstration, on Wednesday at Black Hat USA in Las Vegas, will involve timing attacks, a technique for breaking ciphers. It's effective against databases using BTREE, the most popular database indexing algorithm and data structure, and will use MySQL for demonstration purposes, Core researchers said.

Currently, data breaches are usually the result of bugs in front-end web applications or misconfigured authorization and access control permissions, Core said, but the timing attack doesn't need any such bugs to work.

"The new attack relies solely on the inherent characteristics of the indexing algorithms used by most commercial database management systems," said Core researchers Ariel Waissbein and Pablo Damian Saura in a note on the presentation.

In cryptography, the timing attack is a technique where the attacker analyses the time taken to execute cryptographic algorithms, using the analysis to discover information about how the cryptographic system is implemented and help find a way to crack the system.

Saura and Waissbein's approach is similar: their attack involves performing record insertion operations, typically available to all database users -- including anonymous users of front-end web applications -- and analyzing the time it takes to perform different kinds of insertions.

By analyzing the different timings, attackers can deduce what was inserted previous to the attack, Core said.

On the plus side for organizations with database systems, Core said the attack is "theoretical" and would be difficult to implement, since the attacker would need to have information about the structure and settings of the database to carry it off.

Another complicating factor is that on a "live" database other users could be making insertions at the same time, affecting the results of the timing analysis.

The point is for organizations to be aware that such attacks are possible, so that they can be on their guard, Core said.

The demonstration will include a review of BTREE and will explain how Saura and Waissbein discovered the vulnerability, Core said.

Join the newsletter!

Or
Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Matthew Broersma

Techworld.com
Show Comments

Essentials

Mobile

Exec

Budget

Back To Business Guide

Click for more ›

Brand Post

Bitdefender 2018

Roam freely in the digital world. Critically acclaimed performance and security at your fingertips.

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?