Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

V Cheval, C Cremers, A Dax, L Hirschi… - 32nd USENIX Security …, 2023 - usenix.org
Most cryptographic protocols use cryptographic hash functions as a building block. The
security analyses of these protocols typically assume that the hash functions are perfect …

Formal Analysis and Patching of {BLE-SC} Pairing

M Shi, J Chen, K He, H Zhao, M Jia, R Du - 32nd USENIX Security …, 2023 - usenix.org
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …

Dy fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing

M Ammann, L Hirschi, S Kremer - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Critical and widely used cryptographic protocols have repeatedly been found to contain
flaws in their design and their implementation. A prominent class of such vulnerabilities is …

Sok: Privacy-enhancing technologies in finance

C Baum, JH Chiang, B David… - Cryptology ePrint …, 2023 - eprint.iacr.org
Recent years have seen the emergence of practical advanced cryptographic tools that not
only protect data privacy and authenticity, but also allow for jointly processing data from …

Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions

D Basin, R Sasse, J Toro-Pozo - 30th USENIX Security Symposium …, 2021 - usenix.org
Most EMV transactions require online authorization by the card issuer. Namely, the
merchant's payment terminal sends an authorization request to the card issuer over a …

Practical EMV relay protection

AI Radu, T Chothia, CJP Newton… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …

Sound verification of security protocols: From design to interoperable implementations

L Arquint, FA Wolf, J Lallemand… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
We provide a framework consisting of tools and metatheorems for the end-to-end verification
of security protocols, which bridges the gap between automated protocol verification and …

{RHINE}: Robust and High-performance Internet Naming with {E2E} Authenticity

H Duan, R Fischer, J Lou, S Liu, D Basin… - 20th USENIX Symposium …, 2023 - usenix.org
The variety and severity of recent DNS-based attacks under-score the importance of a
secure naming system. Although DNSSEC provides data authenticity in theory, practical …

Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves

P Antonino, A Derek, WA Wołoszyn - IEEE access, 2023 - ieeexplore.ieee.org
We propose a protocol that explores a synergy between two TEE implementations: it brings
SGX-like remote attestation to SEV VMs. We use the notion of a trusted guest owner …

Subterm-based proof techniques for improving the automation and scope of security protocol analysis

C Cremers, C Jacomme, P Lukert - 2023 IEEE 36th Computer …, 2023 - ieeexplore.ieee.org
During the last decades, many advances in the field of automated security protocol analysis
have seen the field mature and grow from being applicable to toy examples, to modeling …