메뉴 건너뛰기




Volumn , Issue , 2014, Pages 98-113

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84914174218     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.14     Document Type: Conference Paper
Times cited : (131)

References (57)
  • 2
    • 84914100714 scopus 로고    scopus 로고
    • HTTPS Everywhere. https://www.eff.org/https-everywhere, 2014.
    • (2014) HTTPS Everywhere
  • 5
    • 84914134895 scopus 로고    scopus 로고
    • Lucky thirteen: Breaking the TLS and DTLS record protocols
    • N. J. AlFardan and K. G. Paterson. Lucky thirteen: breaking the TLS and DTLS record protocols. In IEEE S&P, 2013.
    • (2013) IEEE S&P
    • Alfardan, N.J.1    Paterson, K.G.2
  • 8
    • 33846614845 scopus 로고    scopus 로고
    • Man-in-the-middle in tunnelled authentication protocols
    • N. Asokan, V. Niemi, and K. Nyberg. Man-in-the-middle in tunnelled authentication protocols. In Security Protocols. 2005.
    • (2005) Security Protocols
    • Asokan, N.1    Niemi, V.2    Nyberg, K.3
  • 9
    • 70449472280 scopus 로고    scopus 로고
    • Detecting man-in-the-middle attacks by precise timing
    • B. Aziz and G. Hamilton. Detecting man-in-the-middle attacks by precise timing. In SECUREWARE, 2009.
    • (2009) SECUREWARE
    • Aziz, B.1    Hamilton, G.2
  • 12
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In ACM CCS, 2008.
    • (2008) ACM CCS
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 13
    • 84914134892 scopus 로고    scopus 로고
    • On the robustness of applications based on the SSL and TLS security protocols
    • D. Berbecaru and A. Lioy. On the Robustness of Applications Based on the SSL and TLS Security Protocols. In PKI. 2007.
    • (2007) PKI
    • Berbecaru, D.1    Lioy, A.2
  • 14
    • 84859467774 scopus 로고    scopus 로고
    • Verified cryptographic implementations for TLS
    • K. Bhargavan, C. Fournet, R. Corin, and E. Žalinescu. Verified Cryptographic Implementations for TLS. ACM TISSEC, 15(1):1-32, 2012.
    • (2012) ACM TISSEC , vol.15 , Issue.1 , pp. 1-32
    • Bhargavan, K.1    Fournet, C.2    Corin, R.3    Žalinescu, E.4
  • 17
    • 79958059418 scopus 로고    scopus 로고
    • Unknown key-share attacks on the station-to-station (STS) protocol
    • S. Blake-Wilson and A. Menezes. Unknown key-share attacks on the station-to-station (STS) protocol. In PKC, 1999.
    • (1999) PKC
    • Blake-Wilson, S.1    Menezes, A.2
  • 18
    • 84872120542 scopus 로고    scopus 로고
    • Origin cookies: Session integrity for Web applications
    • A. Bortz, A. Barth, and A. Czeskis. Origin cookies: Session integrity for Web applications. In W2SP, 2011.
    • (2011) W2SP
    • Bortz, A.1    Barth, A.2    Czeskis, A.3
  • 19
    • 84904434738 scopus 로고    scopus 로고
    • A practical, targeted, and stealthy attack against WPA enterprise authentication
    • A. Cassola, W. Robertson, E. Kirda, and G. Noubir. A practical, targeted, and stealthy attack against WPA enterprise authentication. In NDSS, 2013.
    • (2013) NDSS
    • Cassola, A.1    Robertson, W.2    Kirda, E.3    Noubir, G.4
  • 20
    • 84914134889 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • S. Chaki and A. Datta. ASPIER: An automated framework for verifying security protocol implementations. In IEEE CSF, 2009.
    • (2009) IEEE CSF
    • Chaki, S.1    Datta, A.2
  • 22
    • 84914134888 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    • J. Clark and P. van Oorschot. SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. In IEEE S&P, 2013.
    • (2013) IEEE S&P
    • Clark, J.1    Van Oorschot, P.2
  • 24
    • 84940397122 scopus 로고    scopus 로고
    • Origin-bound certificates: A fresh approach to strong client authentication for the web
    • M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach. Origin-bound certificates: a fresh approach to strong client authentication for the web. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Dietz, M.1    Czeskis, A.2    Balfanz, D.3    Wallach, D.S.4
  • 26
    • 80755169483 scopus 로고    scopus 로고
    • Modular code-based cryptographic verification
    • C. Fournet, M. Kohlweiss, and P.-Y. Strub. Modular code-based cryptographic verification. In ACM CCS, 2011.
    • (2011) ACM CCS
    • Fournet, C.1    Kohlweiss, M.2    Strub, P.-Y.3
  • 28
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: Validating SSL certificates in non-browser software
    • M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: validating SSL certificates in non-browser software. In ACM CCS, 2012.
    • (2012) ACM CCS
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 29
  • 32
  • 34
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the MQV key agreement protocol
    • B. S. Kaliski Jr. An unknown key-share attack on the MQV key agreement protocol. ACM TISSEC, 4(3):275-288, 2001.
    • (2001) ACM TISSEC , vol.4 , Issue.3 , pp. 275-288
    • Kaliski, B.S.1
  • 35
    • 85014848459 scopus 로고    scopus 로고
    • On the security of the TLS protocol: A systematic analysis
    • H. Krawczyk, K. G. Paterson, and H. Wee. On the Security of the TLS Protocol: A Systematic Analysis. In CRYPTO, 2013.
    • (2013) CRYPTO
    • Krawczyk, H.1    Paterson, K.G.2    Wee, H.3
  • 36
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 40
    • 84892393288 scopus 로고    scopus 로고
    • Lessons learned from previous SSL/TLS attacks - A brief chronology of attacks and weaknesses
    • C. Meyer and J. Schwenk. Lessons learned from previous SSL/TLS attacks - A brief chronology of attacks and weaknesses. In IACR Cryptology ePrint Archive, 2013.
    • (2013) IACR Cryptology EPrint Archive
    • Meyer, C.1    Schwenk, J.2
  • 41
    • 33745913964 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
    • R. Oppliger, R. Hauser, and D. Basin. SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Computer Communications, 29(12):2238-2246, 2006.
    • (2006) Computer Communications , vol.29 , Issue.12 , pp. 2238-2246
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 43
    • 84874239302 scopus 로고    scopus 로고
    • Tag size does matter: Attacks and proofs for the TLS record protocol
    • K. G. Paterson, T. Ristenpart, and T. Shrimpton. Tag size does matter: Attacks and proofs for the TLS record protocol. In ASIACRYPT, 2011.
    • (2011) ASIACRYPT
    • Paterson, K.G.1    Ristenpart, T.2    Shrimpton, T.3
  • 52
    • 85084163394 scopus 로고    scopus 로고
    • Truncating TLS connections to violate beliefs in web applications
    • B. Smyth and A. Pironti. Truncating TLS Connections to Violate Beliefs in Web Applications. In USENIX WOOT, 2013.
    • (2013) USENIX WOOT
    • Smyth, B.1    Pironti, A.2
  • 53
    • 84893081685 scopus 로고    scopus 로고
    • The case for prefetching and prevalidating TLS server certificates
    • E. Stark, L.-S. Huang, D. Israni, C. Jackson, and D. Boneh. The case for prefetching and prevalidating TLS server certificates. In NDSS, 2012.
    • (2012) NDSS
    • Stark, E.1    Huang, L.-S.2    Israni, D.3    Jackson, C.4    Boneh, D.5
  • 54
    • 0027735231 scopus 로고
    • Extending cryptographic logics of belief to key agreement protocols
    • P. van Oorschot. Extending cryptographic logics of belief to key agreement protocols. In ACM CCS, 1993.
    • (1993) ACM CCS
    • Van Oorschot, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.