Biographie |
---|
I've been working with computers as long as I remember. At age four, I had a project to find the IP address of every computer on the network at my house. At age five, my parents showed me how to use HTML. To their surprise, they came home the next day to find I had created an entirely new webpage. At age six, I began with software development, with the Visual Basic programming language. At age thirteen, I participated in the Hack The North programming competition, receiving an honorable mention for the sponsor prize from Pebble. The summer between grades seven and eight, I took an interest in computer security, consuming large amounts of online talks and Wikipedia articles, even designing some of my own protocols. Later on during eighth grade, I designed a number of cryptographic primitives, including a block cipher, mode of operation, and hash function. In my spare time, I write software, devour old electronics for spare parts, and play grand strategy video games, Minecraft, and Kerbal Space Program. |
| Ethan White CPU Load Covert Channels Exploiting Interrupt Latency
Défi: | Innovation | Catégorie: | Intermédiaire | Région: | Waterloo-Wellington | Ville: | Waterloo, ON | École: | Waterloo Collegiate Institute | Sommaire: | A covert channel security vulnerability was discovered that allows a remote adversary to perform easy deanonymization of anonymous Internet users. This attack exploits the fact that latency to reply to network requests decreases when load on the computer being attacked is increased. It is suggested to mitigate this attack by maintaining a running process that will always cause full load on one processor core. |
Prix | Valeur | Prix d'excellence - Intermédiaire Médaille de bronze Sponsor: Sciences jeunesse Canada | | Bourse d’études de Western University Médaillé de bronze - Bourse d'admission de 1 000 $ Sponsor: Université Western | 1 000,00 $ | Total | 1 000,00 $ | |