M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …
TLS was designed as a transparent channel abstraction to allow developers with no cryptographic expertise to protect their application against attackers that may control some …
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …
Computer worms—malicious, self-propagating programs—represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread by …
Methods and systems for managing access to a wireless local area network are provided. A wireless access point (AP) may use a unified approach that utilizes an out-of-band channel …
Abstract The TLS Internet Standard features a mixed bag of cryptographic algorithms and constructions, letting clients and servers negotiate their use for each run of the handshake …
K Karimi, S Krit - 2019 International Conference of Computer …, 2019 - ieeexplore.ieee.org
Nowadays, home automation becomes part of people's daily life. Many people aim to control their homes with a click on a smartphone but they are afraid to lose their confidentiality or …
K Ryan, K He, GA Sullivan, N Heninger - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
We demonstrate that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature …
Detecting violations of application-level end-to-end connectivity on the Internet is of significant interest to researchers and end users; recent studies have revealed cases of …