Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …

Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

Key reinstallation attacks: Forcing nonce reuse in WPA2

M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation
flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …

A personalized privacy protection framework for mobile crowdsensing in IIoT

J Xiong, R Ma, L Chen, Y Tian, Q Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent
data collection and processing paradigm of the industrial Internet of Things, has provided a …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - r.jordan.im
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

{DROWN}: Breaking {TLS} Using {SSLv2}

N Aviram, S Schinzel, J Somorovsky… - 25th USENIX Security …, 2016 - usenix.org
DROWN: Breaking TLS using SSLv2 Page 1 This paper is included in the Proceedings of the
25th USENIX Security Symposium August 10–12, 2016 • Austin, TX ISBN 978-1-931971-32-4 …

Protocol state fuzzing of {TLS} implementations

J De Ruiter, E Poll - 24th USENIX Security Symposium (USENIX Security …, 2015 - usenix.org
We describe a largely automated and systematic analysis of TLS implementations by what
we call 'protocol state fuzzing': we use state machine learning to infer state machines from …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …