SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

[图书][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and Xin Zhang to consider …

{LZR}: Identifying unexpected internet services

L Izhikevich, R Teixeira, Z Durumeric - 30th USENIX Security …, 2021 - usenix.org
Internet-wide scanning is a commonly used research technique that has helped uncover
real-world attacks, find cryptographic weaknesses, and understand both operator and …

The 9 lives of Bleichenbacher's CAT: New cache attacks on TLS implementations

E Ronen, R Gillham, D Genkin, A Shamir… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
At CRYPTO'98, Bleichenbacher published his seminal paper which described a padding
oracle attack against RSA implementations that follow the PKCS# 1 v1. 5 standard. Over the …

Verified correctness and security of mbedTLS HMAC-DRBG

KQ Ye, M Green, N Sanguansin, L Beringer… - Proceedings of the …, 2017 - dl.acm.org
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we
have proved its cryptographic security-that its output is pseudorandom--using a hybrid game …

Pseudorandom black swans: Cache attacks on CTR_DRBG

S Cohney, A Kwong, S Paz, D Genkin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …

Taking control of sdn-based cloud systems via the data plane

K Thimmaraju, B Shastry, T Fiebig, F Hetzelt… - Proceedings of the …, 2018 - dl.acm.org
Virtual switches are a crucial component of SDN-based cloud systems, enabling the
interconnection of virtual machines in a flexible and" software-defined" manner. This paper …

Self-guarding cryptographic protocols against algorithm substitution attacks

M Fischlin, S Mazaheri - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to
algorithm substitution attacks. Such self-guarding protocols can prevent undesirable …

The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE}

D Felsch, M Grothe, J Schwenk, A Czubak… - 27th USENIX Security …, 2018 - usenix.org
IPsec enables cryptographic protection of IP packets. It is commonly used to build VPNs
(Virtual Private Networks). For key establishment, the IKE (Internet Key Exchange) protocol …