A comprehensive survey of vulnerability and information security in SDN

R Deb, S Roy - Computer Networks, 2022 - Elsevier
SDN changes the networking vision with an impressive thought of segregating the
networking control from the data management hardware and brings new functionalities such …

Key reinstallation attacks: Forcing nonce reuse in WPA2

M Vanhoef, F Piessens - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
We introduce the key reinstallation attack. This attack abuses design or implementation
flaws in cryptographic protocols to reinstall an already-in-use key. This resets the key's …

Revisiting QUIC attacks: A comprehensive review on QUIC security and a hands-on study

E Chatzoglou, V Kouliaridis, G Karopoulos… - International Journal of …, 2023 - Springer
Built on top of UDP, the recently standardized QUIC protocol primarily aims to gradually
replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit …

Sok: Security evaluation of home-based iot deployments

O Alrawi, C Lever, M Antonakakis… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Home-based IoT devices have a bleak reputation regarding their security practices. On the
surface, the insecurities of IoT devices seem to be caused by integration problems that may …

A comprehensive symbolic analysis of TLS 1.3

C Cremers, M Horvat, J Hoyland, S Scott… - Proceedings of the …, 2017 - dl.acm.org
The TLS protocol is intended to enable secure end-to-end communication over insecure
networks, including the Internet. Unfortunately, this goal has been thwarted a number of …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

Let's Encrypt: an automated certificate authority to encrypt the entire web

J Aas, R Barnes, B Case, Z Durumeric… - Proceedings of the …, 2019 - dl.acm.org
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN

K Bhargavan, G Leurent - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
While modern block ciphers, such as AES, have a block size of at least 128 bits, there are
many 64-bit block ciphers, such as 3DES and Blowfish, that are still widely supported in …