Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Most cryptographic protocols use cryptographic hash functions as a building block. The
security analyses of these protocols typically assume that the hash functions are perfect …
security analyses of these protocols typically assume that the hash functions are perfect …
Formal Analysis and Patching of {BLE-SC} Pairing
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …
Dy fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing
Critical and widely used cryptographic protocols have repeatedly been found to contain
flaws in their design and their implementation. A prominent class of such vulnerabilities is …
flaws in their design and their implementation. A prominent class of such vulnerabilities is …
Sok: Privacy-enhancing technologies in finance
Recent years have seen the emergence of practical advanced cryptographic tools that not
only protect data privacy and authenticity, but also allow for jointly processing data from …
only protect data privacy and authenticity, but also allow for jointly processing data from …
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions
Most EMV transactions require online authorization by the card issuer. Namely, the
merchant's payment terminal sends an authorization request to the card issuer over a …
merchant's payment terminal sends an authorization request to the card issuer over a …
Practical EMV relay protection
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …
Sound verification of security protocols: From design to interoperable implementations
We provide a framework consisting of tools and metatheorems for the end-to-end verification
of security protocols, which bridges the gap between automated protocol verification and …
of security protocols, which bridges the gap between automated protocol verification and …
{RHINE}: Robust and High-performance Internet Naming with {E2E} Authenticity
The variety and severity of recent DNS-based attacks under-score the importance of a
secure naming system. Although DNSSEC provides data authenticity in theory, practical …
secure naming system. Although DNSSEC provides data authenticity in theory, practical …
Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves
We propose a protocol that explores a synergy between two TEE implementations: it brings
SGX-like remote attestation to SEV VMs. We use the notion of a trusted guest owner …
SGX-like remote attestation to SEV VMs. We use the notion of a trusted guest owner …
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
During the last decades, many advances in the field of automated security protocol analysis
have seen the field mature and grow from being applicable to toy examples, to modeling …
have seen the field mature and grow from being applicable to toy examples, to modeling …