作者
Karthikeyan Bhargavan, Antoine Delignat Lavaud, Cédric Fournet, Alfredo Pironti, Pierre Yves Strub
发表日期
2014/5/18
研讨会论文
2014 IEEE Symposium on Security and Privacy
页码范围
98-113
出版商
IEEE
简介
TLS was designed as a transparent channel abstraction to allow developers with no cryptographic expertise to protect their application against attackers that may control some clients, some servers, and may have the capability to tamper with network connections. However, the security guarantees of TLS fall short of those of a secure channel, leading to a variety of attacks. We show how some widespread false beliefs about these guarantees can be exploited to attack popular applications and defeat several standard authentication methods that rely too naively on TLS. We present new client impersonation attacks against TLS renegotiations, wireless networks, challenge-response protocols, and channel-bound cookies. Our attacks exploit combinations of RSA and Diffie-Hellman key exchange, session resumption, and renegotiation to bypass many recent countermeasures. We also demonstrate new ways to exploit …
引用总数
20142015201620172018201920202021202220232024133145453527171821137
学术搜索中的文章
K Bhargavan, AD Lavaud, C Fournet, A Pironti… - 2014 IEEE Symposium on Security and Privacy, 2014
K Bhargavan, A Delignat-Lavaud, C Fournet, A Pironti…