-
5
-
-
84889027202
-
-
IDC - Press Release
-
IDC - Press Release. http://www.idc.com/getdoc.jsp?containerId= prUS24257413.
-
-
-
-
6
-
-
84889000161
-
-
OpenSSL. http://www.openssl.org/.
-
-
-
-
9
-
-
84889064640
-
-
Trace32. http://www.lauterbach.com/.
-
Trace32
-
-
-
12
-
-
85032541897
-
Remote Timing Attacks Are Practical
-
(Berkeley, CA, USA, 2003), USENIX Association
-
D. Brumley and D. Boneh. Remote Timing Attacks Are Practical. In Proceedings of the 12th conference on USENIX Security Symposium - Volume 12 (Berkeley, CA, USA, 2003), USENIX Association, 2003.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
-
-
Brumley, D.1
Boneh, D.2
-
13
-
-
35248836120
-
Password Interception in a SSL/TLS Channel
-
Springer-Verlag
-
B. Canvel, A. Hiltgen, S. Vaudenay, and M. Vuagnoux. Password Interception in a SSL/TLS Channel. In Proceedings of Advances in Cryptology - CRYPTO 2003, Springer-Verlag, pp. 583-599, 2003.
-
(2003)
Proceedings of Advances in Cryptology - CRYPTO 2003
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
15
-
-
84869487159
-
Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
-
S. Fahl, M. Harbach, T. Muders, L. Baumgärtner, B. Freisleben, and M. Smith. Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 50-61, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
16
-
-
84869429339
-
The Most Dangerous Code in the World: Validating SSL Certificates in Non-browser Software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The Most Dangerous Code in the World: Validating SSL Certificates in Non-browser Software. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 38-49, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
17
-
-
85076227028
-
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
-
N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In Proceedings of the 21st USENIX Security Symposium, pp. 205-220, 2012.
-
(2012)
Proceedings of the 21st USENIX Security Symposium
, pp. 205-220
-
-
Heninger, N.1
Durumeric, Z.2
Wustrow, E.3
Halderman, J.A.4
-
19
-
-
84881259892
-
The Linux Pseudorandom Number Generator Revisited
-
Available from
-
P. Lacharme. The Linux Pseudorandom Number Generator Revisited. IACR ePrint Arcive 2012/251. Available from http://eprint.iacr.org/2012/251.
-
IACR ePrint Arcive 2012/251
-
-
Lacharme, P.1
-
20
-
-
78649901040
-
More Tricks for Defeating SSL in Practice
-
M. Marlinspike. More Tricks for Defeating SSL in Practice. In Black Hat USA, 2009.
-
(2009)
Black Hat USA
-
-
Marlinspike, M.1
-
21
-
-
84892393288
-
Lessons Learned from Previous SSL/TLS Attacks: A Brief Chronology of Attacks and Weakness
-
Available from
-
C. Meyer and J. Schwenk. Lessons Learned from Previous SSL/TLS Attacks: A Brief Chronology of Attacks and Weakness. IACR ePrint Arcive 2013/049. Available from http://eprint.iacr.org/2013/049.
-
IACR ePrint Arcive 2013/049
-
-
Meyer, C.1
Schwenk, J.2
-
22
-
-
75449107822
-
-
Technical Report, PhoneFactor, Inc., Nov.
-
M. Ray and S. Dispensa. Renegotiating TLS. Technical Report, PhoneFactor, Inc., Nov. 2009.
-
(2009)
Renegotiating TLS
-
-
Ray, M.1
Dispensa, S.2
-
24
-
-
84889056064
-
-
Research Report 8060, INRIA, Sept.
-
T. Vuillemin, F. Goichon, C. Lauradoux, and G. Salagnac. Entropy Transfers in the Linux Random Number Generator. Research Report 8060, INRIA, Sept. 2012.
-
(2012)
Entropy Transfers in the Linux Random Number Generator
-
-
Vuillemin, T.1
Goichon, F.2
Lauradoux, C.3
Salagnac, G.4
-
25
-
-
84877725095
-
When Private Keys Are Public: Results From the 2008 Debian OpenSSL Vulnerability
-
S. Yilek, E. Rescorla, H. Shacham, B. Enright, and S. Savage. When Private Keys Are Public: Results From the 2008 Debian OpenSSL Vulnerability. In Proceedings of IMC 2009, pp. 15-27, 2009.
-
(2009)
Proceedings of IMC 2009
, pp. 15-27
-
-
Yilek, S.1
Rescorla, E.2
Shacham, H.3
Enright, B.4
Savage, S.5
|