SLIDE 1
- Introduction
- Probabilistic Skiplist
- Skiplist structure mapping
- Possible attacks on Skiplists
- Splay List as a proposed defense
- Summary
Skiplist Timing Attack Vulnerability Eyal Nussbaum PhD Student, - - PowerPoint PPT Presentation
Skiplist Timing Attack Vulnerability Eyal Nussbaum PhD Student, Communication Systems Engineering School of Electrical and Computer Engineering Ben-Gurion University of the Negev Advisor: Professor Michael Segal Talk Overview Introduction
𝑜 2𝑚−1 nodes per level 𝑚.
Figure 1 – 4 level Skiplist with 15 nodes
Figure 2 – Skiplist search example
Search for node in Splay List. Node 9 found. Node 4 chosen for swap and found in Splay List. Top levels swapped between nodes 9 and 4.