SoK: secure messaging

N Unger, S Dechand, J Bonneau, S Fahl… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …

What the app is that? deception and countermeasures in the android user interface

A Bianchi, J Corbetta, L Invernizzi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Mobile applications are part of the everyday lives of billions of people, who often trust them
with sensitive information. These users identify the currently focused app solely by its visual …

[PDF][PDF] PKI 技术的近年研究综述

林璟锵, 荆继武, 张琼露, 王展 - 密码学报, 2015 - jcr.cacrnet.org.cn
公钥基础设施(Public Key Infrastructure, PKI) 是典型的密码应用技术. 在PKI 系统中,
由证书认证机构(Certification Authority, CA) 签发数字证书, 绑定PKI 用户的身份信息和公钥 …

How secure and quick is QUIC? Provable security and performance analyses

R Lychev, S Jero, A Boldyreva… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
QUIC is a secure transport protocol developed by Google and implemented in Chrome in
2013, currently representing one of the most promising solutions to decreasing latency while …

Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning

M Kranch, J Bonneau - 22nd Annual Network and Distributed …, 2015 - nyuscholars.nyu.edu
We have conducted the first in-depth empirical study of two important new web security
features: strict transport security (HSTS) and public-key pinning. Both have been added to …

Efficient gossip protocols for verifying the consistency of certificate logs

L Chuat, P Szalachowski, A Perrig… - … IEEE Conference on …, 2015 - ieeexplore.ieee.org
The level of trust accorded to certification authorities has been decreasing over the last few
years as several cases of misbehavior and compromise have been observed. Log-based …

Vetting SSL usage in applications with SSLINT

B He, V Rastogi, Y Cao, Y Chen… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols have become the
security backbone of the Web and Internet today. Many systems including mobile and …

Deniable key exchanges for secure messaging

N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015 - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …

The lifetime of Android API vulnerabilities: case study on the JavaScript-to-Java interface

DR Thomas, AR Beresford, T Coudray… - Security Protocols XXIII …, 2015 - Springer
We examine the lifetime of API vulnerabilities on Android and propose an exponential decay
model of the uptake of updates after the release of a fix. We apply our model to a case study …

Efficiently bypassing SNI-based HTTPS filtering

WM Shbair, T Cholez, A Goichot… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
Encrypted Internet traffic is an essential element to enable security and privacy in the
Internet. Surveys show that websites are more and more being served over HTTPS. They …