Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperDecember 2024
Privacy Implications of AMQ-Based PQ TLS Authentication
CoNEXT '24: Proceedings of the 20th International Conference on emerging Networking EXperiments and TechnologiesPages 65–72https://doi.org/10.1145/3680121.3697813During the TLS 1.3 handshake, an entity (e.g., a client application) commonly transmits a chain of certificates and certificates' digital signatures to the remote party to authenticate themselves. Towards a transition to post-quantum TLS, several ...
- research-articleDecember 2024
The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards' Network Security Protocols
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1701–1715https://doi.org/10.1145/3658644.3690302Popular Chinese Input Method Editor (IME) keyboards almost universally feature cloud-based features that improve character prediction when typing. Handling such sensitive data (i.e., keystrokes) in transit demands security in transit. In this work, we ...
- research-articleNovember 2024
The Multiple Benefits of a Secure Transport for BGP
Proceedings of the ACM on Networking (PACMNET), Volume 2, Issue CoNEXT4Article No.: 36, Pages 1–23https://doi.org/10.1145/3696406BGP distributes prefixes advertised by Autonomous Systems (ASes) and computes the best paths between them. It is the only routing protocol used to exchange interdomain routes on the Internet. Since its original definition in the late 1980s, BGP uses TCP. ...
- research-articleMay 2024
Performance Evaluation of Transport Layer Security in the 5G Core Control Plane
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 78–88https://doi.org/10.1145/3643833.3656140As 5G is currently being rolled out, security considerations for this critical infrastructure are getting more into focus. Hereby, the security investigation of the 5G core as the central element plays a pivotal role. The structure of the core is based ...
- research-articleNovember 2023
Optimizing 0-RTT Key Exchange with Full Forward Security
CCSW '23: Proceedings of the 2023 on Cloud Computing Security WorkshopPages 55–68https://doi.org/10.1145/3605763.3625246Secure communication protocols such as TLS 1.3 or QUIC are doing the heavy lifting in terms of security of today's Internet. These modern protocols provide modes that do not need an interactive handshake, but allow to send cryptographically protected ...
-
- posterNovember 2023
Poster: Circumventing the GFW with TLS Record Fragmentation
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3528–3530https://doi.org/10.1145/3576915.3624372State actors around the world censor the HTTPS protocol to block access to certain websites. While many circumvention strategies utilize the TCP layer only little emphasis has been placed on the analysis of TLS-a complex protocol and integral building ...
- research-articleNovember 2023
Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2901–2914https://doi.org/10.1145/3576915.3623099We show how to embed a covert key exchange sub protocol within a regular TLS 1.3 execution, generating a stealth key in addition to the regular session keys. The idea, which has appeared in the literature before, is to use the exchanged nonces to ...
- posterOctober 2023
Poster: The Impact of the Client Environment on Residential IP Proxies Detection
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 712–713https://doi.org/10.1145/3618257.3624993Residential IP Proxies (RESIPs) enable proxying out requests from a vast network of residential devices without inserting any information revealing it. While RESIPs can be used for legitimate purposes, previous studies also associate them with malicious ...
- research-articleOctober 2023
Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild
- Hongying Dong,
- Hao Shu,
- Vijay Prakash,
- Yizhe Zhang,
- Muhammad Talha Paracha,
- David Choffnes,
- Santiago Torres-Arias,
- Danny Yuxing Huang,
- Yixin Sun
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 457–477https://doi.org/10.1145/3618257.3624815IoT devices are increasingly used in consumer homes. Despite recent works in characterizing IoT TLS usage for a limited number of in-lab devices, there exists a gap in quantitatively understanding TLS behaviors from devices in the wild and server-side ...
- research-articleJune 2023
The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators
WiSec '23: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 251–261https://doi.org/10.1145/3558482.3590199In the context of connecting to enterprise Wi-Fi, previous works show that relying on human users to manually configure or enforce server authentication often leads to insecure outcomes. Consequently, many user credentials can potentially be stolen by ...
- ArticleNovember 2022
BADPASS: Bots Taking ADvantage of Proxy as a Service
Information Security Practice and ExperiencePages 327–344https://doi.org/10.1007/978-3-031-21280-2_18AbstractWeb scraping bots are now using so-called Residential ip Proxy (resip) services to defeat state-of-the-art commercial bot countermeasures. resip providers promise their customers to give them access to tens of millions of residential ip addresses, ...
- research-articleNovember 2022
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies
- James Larisch,
- Waqar Aqeel,
- Michael Lum,
- Yaelle Goldschlag,
- Leah Kannan,
- Kasra Torshizi,
- Yujie Wang,
- Taejoong Chung,
- Dave Levin,
- Bruce M. Maggs,
- Alan Mislove,
- Bryan Parno,
- Christo Wilson
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 1857–1870https://doi.org/10.1145/3548606.3560594This paper proposes using a logic programming language to disentangle X.509 certificate validation policy from mechanism. Expressing validation policies in a logic programming language provides multiple benefits. First, policy and mechanism can be more ...
- research-articleNovember 2022
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 365–379https://doi.org/10.1145/3548606.3559360TLS 1.3, the newest version of the Transport Layer Security (TLS) protocol, provides strong authentication and confidentiality guarantees that have been comprehensively analyzed in a variety of formal models. However, despite its controversial use of ...
- research-articleOctober 2022
A comparative analysis of certificate pinning in Android & iOS
- Amogh Pradeep,
- Muhammad Talha Paracha,
- Protick Bhowmick,
- Ali Davanian,
- Abbas Razaghpanah,
- Taejoong Chung,
- Martina Lindorfer,
- Narseo Vallina-Rodriguez,
- Dave Levin,
- David Choffnes
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 605–618https://doi.org/10.1145/3517745.3561439TLS certificate pinning is a security mechanism used by applications (apps) to protect their network traffic against malicious certificate authorities (CAs), in-path monitoring, and other methods of TLS tampering. Pinning can provide enhanced security ...
- research-articleMay 2022
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 712–726https://doi.org/10.1145/3488932.3517387The security of digital communication relies on few cryptographic protocols that are used to protect internet traffic, from web sessions to instant messaging. These protocols and the cryptographic primitives they rely on have been extensively studied ...
- rfcDecember 2021
RFC 9162: Certificate Transparency Version 2.0
This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit ...
- rfcDecember 2021
RFC 9155: Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2
The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS 1.2 digital signatures. However, this document does not deprecate SHA-1 with Hashed Message Authentication Code (HMAC), ...
- research-articleNovember 2021
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
- Jan Peter Drees,
- Pritha Gupta,
- Eyke Hüllermeier,
- Tibor Jager,
- Alexander Konze,
- Claudia Priesterjahn,
- Arunselvan Ramaswamy,
- Juraj Somorovsky
AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and SecurityPages 169–180https://doi.org/10.1145/3474369.3486868Currently most practical attacks on cryptographic protocols like TLS are based on side channels, such as padding oracles. Some well-known recent examples are DROWN, ROBOT and Raccoon (USENIX Security 2016, 2018, 2021). Such attacks are usually found by ...
- research-articleNovember 2021
ROSEN: RObust and SElective Non-repudiation (for TLS)
CCSW '21: Proceedings of the 2021 on Cloud Computing Security WorkshopPages 97–109https://doi.org/10.1145/3474123.3486763A versatile non-repudiation service that can be used directly and without application-specific modifications is desirable in many realistic use-cases. Since TLS is one of the most popular current means of secure communication, several proposals have ...
- research-articleFebruary 2021
A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web
- Iman Akbari,
- Mohammad A. Salahuddin,
- Leni Ven,
- Noura Limam,
- Raouf Boutaba,
- Bertrand Mathieu,
- Stephanie Moteau,
- Stephane Tuffin
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 5, Issue 1Article No.: 4, Pages 1–26https://doi.org/10.1145/3447382Traffic classification is essential in network management for operations ranging from capacity planning, performance monitoring, volumetry, and resource provisioning, to anomaly detection and security. Recently, it has become increasingly challenging ...