[Date Prev][Date Next][Thread Prev][Thread Next]
[Date Index]
[Thread Index]
- Subject: Re: Hash Table Collisions (n.runs-SA-2011.004)
 
- From: Mark Hamburg <mark@...>
 
- Date: Tue, 3 Jan 2012 07:26:03 -0800
 
On Jan 3, 2012, at 6:21 AM, Javier Guerra Giraldez wrote:
> On Mon, Jan 2, 2012 at 10:49 PM, Mark Hamburg <mark@grubmah.com> wrote:
>> Presumably the malicious data isn't going to survive a GC.
> 
> in the original paper, the danger is in hashtables with keys from the
> network.  they would totally survive a GC.
How? I'm assuming they are delivered as part of the HTTP header. Presumably most web servers wouldn't need to keep around the results of parsing headers from previous requests.
Mark
- References:
- Re: Hash Table Collisions (n.runs-SA-2011.004), TNHarris
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Mark Hamburg
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Tom N Harris
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Mark Hamburg
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Vladimir Protasov
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Leo Razoumov
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), David Kolf
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Matthew Wild
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Mark Hamburg
 
- Re: Hash Table Collisions (n.runs-SA-2011.004), Javier Guerra Giraldez