“They're not that hard to mitigate”: What cryptographic library developers think about timing attacks

J Jancar, M Fourné, DDA Braga, M Sabt… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Timing attacks are among the most devastating side-channel attacks, allowing remote
attackers to retrieve secret material, including cryptographic keys, with relative ease. In …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Ten years of zmap

Z Durumeric, D Adrian, P Stephens, E Wustrow… - Proceedings of the …, 2024 - dl.acm.org
Since ZMap's debut in 2013, networking and security researchers have used the open-
source scanner to write hundreds of research papers that study Internet behavior. In …

Changing of the guards: Certificate and public key management on the internet

CM Bruhner, O Linnarsson, M Nemec, M Arlitt… - … Conference on Passive …, 2022 - Springer
Certificates are the foundation of secure communication over the internet. However, not all
certificates are created and managed in a consistent manner and the certificate authorities …

The tip of the iceberg: On the merits of finding security bugs

N Alexopoulos, SM Habib, S Schulz… - ACM Transactions on …, 2020 - dl.acm.org
In this article, we investigate a fundamental question regarding software security: Is the
security of SW releases increasing over time? We approach this question with a detailed …

PARASITE: Password recovery attack against SRP implementations in the wild

D de Almeida Braga, PA Fouque, M Sabt - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Protocols for password-based authenticated key exchange (PAKE) allow two users sharing
only a short, low-entropy password to establish a secure session with a cryptographically …

Will you trust this tls certificate? perceptions of people working in it

M Ukrop, L Kraus, V Matyas… - Proceedings of the 35th …, 2019 - dl.acm.org
Flawed TLS certificates are not uncommon on the Internet. While they signal a potential
issue, in most cases they have benign causes (eg, misconfiguration or even deliberate …

Why Johnny the developer can't work with public key certificates: An experimental study of OpenSSL usability

M Ukrop, V Matyas - Topics in Cryptology–CT-RSA 2018: The …, 2018 - Springer
There have been many studies exposing poor usability of security software for the common
end user. However, only a few inspect the usability challenges faced by more …

D4GW: DTLS for gateway multiplexed application to secure MQTT (SN)-based pub/sub architecture

B Imran, M Ahsan, AH Akbar, GA Shah - Internet of Things, 2024 - Elsevier
MQTT-SN a pub/sub application layer protocol is a well-established protocol in the Internet
of Things (IoT) paradigm. MQTT-SN gateway application is available as an open-source …

Private certifier intersection

BC Ghosh, S Patranabis, D Vinayagamurthy… - Cryptology ePrint …, 2022 - eprint.iacr.org
We initiate the study of Private Certifier Intersection (PCI), which allows mutually distrusting
parties to establish a trust basis for cross-validation of claims if they have one or more trust …