BEGIN:VCALENDAR
VERSION:2.0
PRODID:ics.py - http://git.io/lLljaA
BEGIN:VEVENT
DESCRIPTION:Want a taste of cybersecurity - and pizza - in your Friday? Come learn about a common tool in computer science\, how it can be attacked\, and how to defend against such attacks with CS tenure-track candidate Dr. Blake Jackson! Pizza at noon\, either just outside Tutt Science or in the lecture hall!\n\nFriday • 12/16/22 • 12:30 - 1:30 PM\nKresge Lecture Hall (Tutt 122)\n\nRated PG (some undergraduate CS experience recommended).\n\nFull abstract:\nHash tables are one of the most important and ubiquitous data structures in software engineering. When we want to store (key\, value) pairs and access values extremely quickly by their keys\, hash tables are often more efficient than other options. Almost all kinds of software use hash tables\, so\, when a denial of service vulnerability was discovered in pervasive hash table implementations\, it was a big deal! The attack that exploits this vulnerability is known as "hash flooding"\, and it took the cybersecurity community roughly a decade to truly address it. In fact\, some widely used web application libraries were still vulnerable to hash flooding attacks under certain circumstances as recently as 2017. This talk will begin by reviewing (or introducing for students who haven't seen it before) how hash tables work and why they're so useful before discussing hash flooding attacks and briefly introducing some ways that people have tried to mitigate them. This talk was inspired by a recent conversation with some of my students at Harvey Mudd\, and I thought the topic might be interesting to you too!\n\nhttps://today.coloradocollege.edu/events/5766
DTEND:20221216T203000Z
LOCATION:Tutt Science 122 - Lecture Hall (Social Science)
DTSTART:20221216T193000Z
SUMMARY:Talk: An Introduction to Hash Flooding\, One of the Most Broadly Applicable Denial of Service Exploits Ever!
UID:dae0cb0c-28a2-4c61-8e3f-4695ea1ae3f9
END:VEVENT
END:VCALENDAR