-
1
-
-
84954137569
-
Imperfect forward secrecy: How Diffie-Hellman fails in practice
-
Oct
-
ADRIAN, D., BHARGAVAN, K., DURUMERIC, Z., GAUDRY, P., GREEN, M., HALDERMAN, J. A., HENINGER, N., SPRINGALL, D., THOMÉ, E., VALENTA, L., VANDERSLOOT, B., WUSTROW, E., ZANELLA-BÉGUELIN, S., AND ZIMMERMANN, P. Imperfect forward secrecy: How Diffie-Hellman fails in practice. In 22nd ACM Conference on Computer and Communications Security (Oct. 2015).
-
(2015)
22nd ACM Conference on Computer and Communications Security
-
-
Adrian, D.1
Bhargavan, K.2
Durumeric, Z.3
Gaudry, P.4
Green, M.5
Halderman, J.A.6
Heninger, N.7
Springall, D.8
Thomé, E.9
Valenta, L.10
Vandersloot, B.11
Wustrow, E.12
Zanella-Béguelin, S.13
Zimmermann, P.14
-
3
-
-
85019748703
-
On the security of RC4 in TLS
-
ALFARDAN, N. J., BERNSTEIN, D. J., PATERSON, K. G., POETTERING, B., AND SCHULDT, J. C. On the security of RC4 in TLS. In 22nd USENIX Security Symposium (2013), pp. 305–320.
-
(2013)
22nd USENIX Security Symposium
, pp. 305-320
-
-
Alfardan, N.J.1
Bernstein, D.J.2
Paterson, K.G.3
Poettering, B.4
Schuldt, J.C.5
-
4
-
-
84865516206
-
Efficient padding oracle attacks on cryptographic hardware
-
Springer
-
BARDOU, R., FOCARDI, R., KAWAMOTO, Y., SIMIONATO, L., STEEL, G., AND TSAY, J.-K. Efficient padding oracle attacks on cryptographic hardware. In Advances in Cryptology–CRYPTO 2012. Springer, 2012, pp. 608–625.
-
(2012)
Advances in Cryptology–CRYPTO 2012
, pp. 608-625
-
-
Bardou, R.1
Focardi, R.2
Kawamoto, Y.3
Simionato, L.4
Steel, G.5
Tsay, J.-K.6
-
5
-
-
84940995903
-
A messy state of the union: Taming the composite state machines of TLS
-
BEURDOUCHE, B., BHARGAVAN, K., DELIGNAT-LAVAUD, A., FOURNET, C., KOHLWEISS, M., PIRONTI, A., STRUB, P.-Y., AND ZINZINDOHOUE, J. K. A messy state of the union: Taming the composite state machines of TLS. In IEEE Symposium on Security and Privacy (2015).
-
(2015)
IEEE Symposium on Security and Privacy
-
-
Beurdouche, B.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Fournet, C.4
Kohlweiss, M.5
Pironti, A.6
Strub, P.-Y.7
Zinzindohoue, J.K.8
-
6
-
-
84914174218
-
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
-
BHARGAVAN, K., LAVAUD, A. D., FOURNET, C., PIRONTI, A., AND STRUB, P. Y. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In IEEE Symposium on Security and Privacy (2014), IEEE, pp. 98–113.
-
(2014)
IEEE Symposium on Security and Privacy
, pp. 98-113
-
-
Bhargavan, K.1
Lavaud, A.D.2
Fournet, C.3
Pironti, A.4
Strub, P.Y.5
-
9
-
-
85076477980
-
-
BREYHA, W., DURVAUX, D., DUSSA, T., KAPLAN, L. A., MENDEL, F., MOCK, C., KOSCHUCH, M., KRIEGISCH, A., PÖSCHL, U., SABET, R., SAN, B., SCHLATTERBECK, R., SCHRECK, T., WÜRSTLEIN, A., ZAUNER, A., AND ZAWODSKY, P. Better crypto – applied crypto hardening, 2016. Available at https://bettercrypto.org/static/applied-crypto-hardening.pdf.
-
(2016)
Better Crypto – Applied Crypto Hardening
-
-
Breyha, W.1
Durvaux, D.2
Dussa, T.3
Kaplan, L.A.4
Mendel, F.5
Mock, C.6
Koschuch, M.7
Kriegisch, A.8
Pöschl, U.9
Sabet, R.10
San, B.11
Schlatterbeck, R.12
Schreck, T.13
Würstlein, A.14
Zauner, A.15
Zawodsky, P.16
-
10
-
-
84910612876
-
-
CHANG, W.-T., AND LANGLEY, A. QUIC crypto, 2014. https://docs.google.com/document/d/1g5nIXAIkN_Y7XJW5K45IblHd_L2f5LTaDUDwvZ5L6g/edit?pli=1.
-
(2014)
QUIC Crypto
-
-
Chang, W.-T.1
Langley, A.2
-
11
-
-
85076472373
-
-
CVE-2015-0293
-
CVE-2015-0293. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293.
-
-
-
-
12
-
-
84977530212
-
Protocol state fuzzing of TLS implementations
-
Washington, D.C., Aug. USENIX Association
-
DE RUITER, J., AND POLL, E. Protocol state fuzzing of TLS implementations. In 24th USENIX Security Symposium (Washington, D.C., Aug. 2015), USENIX Association.
-
(2015)
24th USENIX Security Symposium
-
-
de Ruiter, J.1
Poll, E.2
-
15
-
-
84910125196
-
The matter of Heartbleed
-
New York, NY, USA, IMC’14, ACM
-
DURUMERIC, Z., KASTEN, J., ADRIAN, D., HALDERMAN, J. A., BAILEY, M., LI, F., WEAVER, N., AMANN, J., BEEKMAN, J., PAYER, M., AND PAXSON, V. The matter of Heartbleed. In 14th Internet Measurement Conference (New York, NY, USA, 2014), IMC’14, ACM, pp. 475–488.
-
(2014)
14th Internet Measurement Conference
, pp. 475-488
-
-
Durumeric, Z.1
Kasten, J.2
Adrian, D.3
Halderman, J.A.4
Bailey, M.5
Li, F.6
Weaver, N.7
Amann, J.8
Beekman, J.9
Payer, M.10
Paxson, V.11
-
18
-
-
85076477438
-
Secure protocols in a hostile world
-
Aug
-
GREEN, M. Secure protocols in a hostile world. In CHES 2015 (Aug. 2015). https://isi.jhu.edu/~mgreen/CHESPDF.pdf.
-
(2015)
CHES 2015
-
-
Green, M.1
-
19
-
-
85076492364
-
-
HAMILTON, R. QUIC discovery. https://docs.google.com/document/d/1i4m7DbrWGgXafHxwl8SwIusY2ELUe8WX258xt2LFxPM/ edit#.
-
QUIC Discovery
-
-
Hamilton, R.1
-
20
-
-
85076466927
-
-
Hashcat. http://hashcat.net.
-
-
-
-
21
-
-
85076227028
-
Mining your Ps and QS: Detection of widespread weak keys in network devices
-
Aug
-
HENINGER, N., DURUMERIC, Z., WUSTROW, E., AND HALDERMAN, J. A. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In 21st USENIX Security Symposium (Aug. 2012).
-
(2012)
21st USENIX Security Symposium
-
-
Heninger, N.1
Durumeric, Z.2
Wustrow, E.3
Halderman, J.A.4
-
23
-
-
84995754138
-
TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication
-
Geneva, Switzerland, Feb. S. Capkun, Ed., Internet Society
-
HOLZ, R., AMANN, J., MEHANI, O., WACHS, M., AND KAAFAR, M. A. TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication. In Network and Distributed System Security Symposium (Geneva, Switzerland, Feb. 2016), S. Capkun, Ed., Internet Society.
-
(2016)
Network and Distributed System Security Symposium
-
-
Holz, R.1
Amann, J.2
Mehani, O.3
Wachs, M.4
Kaafar, M.A.5
-
25
-
-
84865589043
-
Bleichenbacher’s attack strikes again: Breaking PKCS#1 v1.5 in XML encryption
-
Berlin, Heidelberg, Springer Berlin Heidelberg
-
JAGER, T., SCHINZEL, S., AND SOMOROVSKY, J. Bleichenbacher’s attack strikes again: Breaking PKCS#1 v1.5 in XML encryption. In 17th European Symposium on Research in Computer Security (Berlin, Heidelberg, 2012), Springer Berlin Heidelberg, pp. 752–769.
-
(2012)
17th European Symposium on Research in Computer Security
, pp. 752-769
-
-
Jager, T.1
Schinzel, S.2
Somorovsky, J.3
-
26
-
-
84954113686
-
On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption
-
New York, NY, USA, CCS’15, ACM
-
JAGER, T., SCHWENK, J., AND SOMOROVSKY, J. On the security of TLS 1.3 and QUIC against weaknesses in PKCS#1 v1.5 encryption. In 22nd ACM Conference on Computer and Communications Security (New York, NY, USA, 2015), CCS’15, ACM, pp. 1185–1196.
-
(2015)
22nd ACM Conference on Computer and Communications Security
, pp. 1185-1196
-
-
Jager, T.1
Schwenk, J.2
Somorovsky, J.3
-
28
-
-
85076468608
-
Fix reachable assert in SSLv2 servers
-
Mar
-
KÄSPER, E. Fix reachable assert in SSLv2 servers. OpenSSL patch, Mar. 2015. https://github.com/openssl/openssl/commit/ 86f8fb0e344d62454f8daf3e15236b2b59210756.
-
(2015)
OpenSSL Patch
-
-
Käsper, E.1
-
29
-
-
35248848850
-
Attacking RSA-based sessions in SSL/TLS
-
Springer
-
KLIMA, V., POKORNY , O., AND ROSA, T. Attacking RSA-based sessions in SSL/TLS. In Cryptographic Hardware and Embedded Systems-CHES 2003. Springer, 2003, pp. 426–440.
-
(2003)
Cryptographic Hardware and Embedded Systems-CHES 2003
, pp. 426-440
-
-
Klima, V.1
Pokorny, O.2
Rosa, T.3
-
31
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
LENSTRA, A. K., LENSTRA, H. W., AND LOVÁSZ, L. Factoring polynomials with rational coefficients. Mathematische Annalen 261 (1982), 515–534. 10.1007/BF01457454.
-
(1982)
Mathematische Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
32
-
-
84869409533
-
A cross-protocol attack on the TLS protocol
-
New York, NY, USA, CCS’12, ACM
-
MAVROGIANNOPOULOS, N., VERCAUTEREN, F., VELICHKOV, V., AND PRENEEL, B. A cross-protocol attack on the TLS protocol. In 19th ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS’12, ACM, pp. 62–72.
-
(2012)
19th ACM Conference on Computer and Communications Security
, pp. 62-72
-
-
Mavrogiannopoulos, N.1
Vercauteren, F.2
Velichkov, V.3
Preneel, B.4
-
33
-
-
84938935829
-
Sok: Lessons learned from SSL/TLS attacks
-
Berlin, Heidelberg, Aug. WISA 2013, Springer-Verlag
-
MEYER, C., AND SCHWENK, J. SoK: Lessons learned from SSL/TLS attacks. In 14th International Workshop on Information Security Applications (Berlin, Heidelberg, Aug. 2013), WISA 2013, Springer-Verlag.
-
(2013)
14th International Workshop on Information Security Applications
-
-
Meyer, C.1
Schwenk, J.2
-
34
-
-
85061943650
-
Revisiting SSL/TLS implementations: New Bleichenbacher side channels and attacks
-
USENIX Association, San Diego, CA, Aug
-
MEYER, C., SOMOROVSKY, J., WEISS, E., SCHWENK, J., SCHINZEL, S., AND TEWS, E. Revisiting SSL/TLS implementations: New Bleichenbacher side channels and attacks. In 23rd USENIX Security Symposium. USENIX Association, San Diego, CA, Aug. 2014, pp. 733–748.
-
(2014)
23rd USENIX Security Symposium
, pp. 733-748
-
-
Meyer, C.1
Somorovsky, J.2
Weiss, E.3
Schwenk, J.4
Schinzel, S.5
Tews, E.6
-
36
-
-
85076472507
-
-
OPENSSL. Change log. https://www.openssl.org/news/changelog.html#x0.
-
Change Log
-
-
-
39
-
-
84977947706
-
-
ROSKIND, J. QUIC design document, 2013. https://docs.google.com/a/chromium.org/document/d/ 1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34.
-
(2013)
QUIC Design Document
-
-
Roskind, J.1
-
42
-
-
84910683194
-
Cross-tenant side-channel attacks in PaaS clouds
-
New York, NY, USA, CCS’14, ACM
-
ZHANG, Y., JUELS, A., REITER, M. K., AND RISTENPART, T. Cross-tenant side-channel attacks in PaaS clouds. In 21st ACM Conference on Computer and Communications Security (New York, NY, USA, 2014), CCS’14, ACM, pp. 990–1003.
-
(2014)
21st ACM Conference on Computer and Communications Security
, pp. 990-1003
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|