7 Hits in 3.4 sec

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews
2014 USENIX Security Symposium  
Table 1 ): We present four new Bleichenbacher side channels, and three successful Bleichenbacher attacks against the Java Secure Socket Extension (JSSE) SSL/TLS implementation and against hardware security  ...  Three of these side channels are timingbased, and two of them provide the first timing-based Bleichenbacher attacks on SSL/TLS described in the literature.  ...  Acknowledgements We would like to thank Graham Steel for providing us their improved Bleichenbacher attack code [4] , and the security of Oracle, Cavium, IBM and F5 for their cooperation.  ... 
dblp:conf/uss/MeyerSWSST14 fatcat:3ehusmbw5jffhot3qi73mjmxvi

SoK: Lessons Learned from SSL/TLS Attacks [chapter]

Christopher Meyer, Jörg Schwenk
2014 Lecture Notes in Computer Science  
SSL/TLS can be used for ensuring data confidentiality, integrity and authenticity during transport.  ...  Protocols, on the PKI infrastructure and various other attacks.  ...  With this side-channel, it is possible to draw conclusions on the plaintext. Rizzo and Duong used this observation to attack SSL/TLS (cf. 3.12).  ... 
doi:10.1007/978-3-319-05149-9_12 fatcat:u2hn3qqjzzbobmsm4h3tiibdl4

A Tangled World Wide Web of Security Issues

Joris Claessens, Bart Preneel, Joos Vandewalle
2002 First Monday  
Bleichenbacher [15] discovered an attack on SSL/TLS servers which support PKCS#1 v1.5 [83] encoded RSA ciphersuites.  ...  of these modes are not met in SSL/TLS, and an attack has been found by Vaudenay [9]).  ... 
doi:10.5210/fm.v7i3.935 fatcat:cssxalxebrcthadbtyi5epz4ma

Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) [article]

Robert Merget, Marcus Brinkmann, Nimrod Aviram, Juraj Somorovsky, Johannes Mittmann, Jörg Schwenk
2020 IACR Cryptology ePrint Archive  
Our main result is a novel side-channel attack, named Raccoon attack, which exploits a timing vulnerability in TLS-DH(E), leaking the most significant bits of the shared Diffie-Hellman secret.  ...  If the server reuses ephemeral keys, this side channel may allow an attacker to recover the premaster secret by solving an instance of the Hidden Number Problem.  ...  Side-channel attacks against TLS.  ... 
dblp:journals/iacr/MergetBASMS20 fatcat:imgympuz3vbalo6wfvn35seasu

On Breaking SAML: Be Whoever You Want to Be

Juraj Somorovsky, Andreas Mayer, Jörg Schwenk, Marco Kampmann, Meiko Jensen
2012 USENIX Security Symposium  
Its feasibility was proven by additional discovery of a new XSW variant.  ...  We propose the first framework to analyze such attacks, which is based on the information flow between two components of the Relying Party.  ...  Symposium on Security and Privacy) for their valuable remarks on the developed attacks and the paper content.  ... 
dblp:conf/uss/SomorovskyMSKJ12 fatcat:umiihwxaczed5cxkuy6iighbiy

Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections

Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef
2020 USENIX Security Symposium  
In remote timing attacks, a significant source of jitter is the network path between the adversary and the targeted server, making it practically infeasible to successfully exploit timing side-channels  ...  We show how these attacks result in a 100-fold improvement over typical timing attacks performed over the Internet, and can accurately detect timing differences as small as 100ns, similar to attacks launched  ...  This work was partially supported by the Center for Cyber Security at New York University Abu Dhabi (NYUAD) and an NYUAD REF-2018 award.  ... 
dblp:conf/uss/GoethemPJV20 fatcat:lb6fmvb26zdijoolvzh3to5zpm

Systematic Evaluations Of Security Mechanism Deployments

Sze Yiu Chau
With respect to a well-defined hierarchy of adversarial capabilities and attack surfaces, we find that many content distribution applications, including that of some world-renowned publications and streaming  ...  A validation logic that is overly restrictive could lead to the loss of legitimate services, while an overly permissive implementation could open door to impersonation attacks.  ...  Attacks against implementations of standardized cryptography Side channel attacks.  ... 
doi:10.25394/pgs.9037817 fatcat:c62pusqmdjacpgq2cwcdonvcvi