Hash, Hack, Code - Emerging Trends in Cyber Security
Description
Hashing schemes for passwords. Monitoring the Internet of Things. Securing program control flow. These are the latest developments in cyber security you need to understand for defending against various attack techniques.
Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives deeper into how you can protect networks and prevent harmful viruses and threats.
Presented by the Stanford Center for Professional Development in association with the Graduate Certificate in Cyber Security (http://stanford.io/1TPcKYD) and Professional Certificate in Advanced Computer Security (http://computersecurity.stanford.edu)
Tags
Syllabus
Introduction.
Webinar overview.
A (small) sample of password breaches.
How to store passwords.
How to hash?.
Audience Poll How much faster is custom hardware at evaluating SHA256 compared to a commodity CPU? (say, on an intel Skylake Xeon).
Why is custom hardware faster?.
How to hash: a better approach Scrypt a slow hash function AND need lots of memory to evaluate custom hardware not much faster than commodity CPU.
Balloon hashing.
Control flow integrity (CFI) TABEL'OS.
Cryptographic Control Flow Integrity (CCFI) Threat model.
Are you nuts? Performance!!.
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/fe12b4747064.jpg)
Hash, Hack, Code - Emerging Trends in Cyber Security
-
TypeOnline Course
-
Provider
Hashing schemes for passwords. Monitoring the Internet of Things. Securing program control flow. These are the latest developments in cyber security you need to understand for defending against various attack techniques.
Join Professor Dan Boneh as he shares new approaches to these emerging trends and dives deeper into how you can protect networks and prevent harmful viruses and threats.
Presented by the Stanford Center for Professional Development in association with the Graduate Certificate in Cyber Security (http://stanford.io/1TPcKYD) and Professional Certificate in Advanced Computer Security (http://computersecurity.stanford.edu)
Introduction.
Webinar overview.
A (small) sample of password breaches.
How to store passwords.
How to hash?.
Audience Poll How much faster is custom hardware at evaluating SHA256 compared to a commodity CPU? (say, on an intel Skylake Xeon).
Why is custom hardware faster?.
How to hash: a better approach Scrypt a slow hash function AND need lots of memory to evaluate custom hardware not much faster than commodity CPU.
Balloon hashing.
Control flow integrity (CFI) TABEL'OS.
Cryptographic Control Flow Integrity (CCFI) Threat model.
Are you nuts? Performance!!.