Easing the conscience with OPC UA: An internet-wide study on insecure deployments

M Dahlmanns, J Lohmöller, IB Fink… - Proceedings of the …, 2020 - dl.acm.org
Due to increasing digitalization, formerly isolated industrial networks, eg, for factory and
process automation, move closer and closer to the Internet, mandating secure …

We really need to talk about session tickets: A {Large-Scale} analysis of cryptographic dangers with {TLS} session tickets

S Hebrok, S Nachtigall, M Maehren, N Erinola… - 32nd USENIX Security …, 2023 - usenix.org
Session tickets improve the performance of the TLS protocol. They allow abbreviating the
handshake by using secrets from a previous session. To this end, the server encrypts the …

Raccoon Attack: Finding and Exploiting {Most-Significant-Bit-Oracles} in {TLS-DH (E})

R Merget, M Brinkmann, N Aviram… - 30th USENIX Security …, 2021 - usenix.org
Diffie-Hellman key exchange (DHKE) is a widely adopted method for exchanging
cryptographic key material in real-world protocols like TLS-DH (E). Past attacks on TLS-DH …

Missed opportunities: Measuring the untapped TLS support in the industrial Internet of Things

M Dahlmanns, J Lohmöller, J Pennekamp… - Proceedings of the …, 2022 - dl.acm.org
The ongoing trend to move industrial appliances from previously isolated networks to the
Internet requires fundamental changes in security to uphold secure and safe operation …

Session resumption protocols and efficient forward security for TLS 1.3 0-RTT

N Aviram, K Gellert, T Jager - Journal of Cryptology, 2021 - Springer
Abstract The TLS 1.3 0-RTT mode enables a client reconnecting to a server to send
encrypted application-layer data in “0-RTT”(“zero round-trip time”), without the need for a …

Ten years of zmap

Z Durumeric, D Adrian, P Stephens, E Wustrow… - Proceedings of the …, 2024 - dl.acm.org
Since ZMap's debut in 2013, networking and security researchers have used the open-
source scanner to write hundreds of research papers that study Internet behavior. In …

Open to a fault: On the passive compromise of {TLS} keys via transient errors

GA Sullivan, J Sippe, N Heninger… - 31st USENIX Security …, 2022 - usenix.org
It is well known in the cryptographic literature that the most common digital signature
schemes used in practice can fail catastrophically in the presence of faults during …

Retina: analyzing 100GbE traffic on commodity hardware

G Wan, F Gong, T Barbette, Z Durumeric - Proceedings of the ACM …, 2022 - dl.acm.org
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …

Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem

S Calzavara, R Focardi, M Nemec… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …

Tracking users across the web via TLS session resumption

E Sy, C Burkert, H Federrath, M Fischer - Proceedings of the 34th …, 2018 - dl.acm.org
User tracking on the Internet can come in various forms, eg, via cookies or by fingerprinting
web browsers. A technique that got less attention so far is user tracking based on TLS and …