Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage}

C Garman, M Green, G Kaptchuk, I Miers… - 25th USENIX Security …, 2016 - usenix.org
Apple's iMessage is one of the most widely-deployed end-to-end encrypted messaging
protocols. Despite its broad deployment, the encryption protocols used by iMessage have …

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

MS Kiraz - Journal of Ambient Intelligence and Humanized …, 2016 - Springer
The concept of cloud computing offers measurable computational or information resources
as a service over the Internet. The major motivation behind the cloud setup is economic …

FDIPP: false data injection prevention protocol for smart Grid distribution systems

H Hittini, A Abdrabou, L Zhang - Sensors, 2020 - mdpi.com
In this paper, a false data injection prevention protocol (FDIPP) for smart grid distribution
systems is proposed. The protocol is designed to work over a novel hierarchical …

SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations

Y Fan, Y Xu, C Garman - … on Applied Cryptography and Network Security, 2024 - Springer
With the growing interest in privacy-enhancing technologies, we are seeing a
complementary growth in the desire to build and deploy complex cryptographic systems that …

Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol

G Avoine, L Ferreira - Journal of Cryptology, 2025 - Springer
We describe in this paper how to perform a padding oracle attack against the GlobalPlatform
SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in …

Automating the development of chosen ciphertext attacks

G Beck, M Zinkus, M Green - 29th USENIX Security Symposium …, 2020 - usenix.org
In this work we investigate the problem of automating the development of adaptive chosen
ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous …

On the (in-) security of javascript object signing and encryption

D Detering, J Somorovsky, C Mainka… - Proceedings of the 1st …, 2017 - dl.acm.org
JavaScript Object Notation (JSON) has evolved to the de-facto standard file format in the
web used for application configuration, cross-and same-origin data exchange, as well as in …

Post-quantum XML and SAML Single Sign-On

J Müller, J Oupický - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Extensible Markup Language (XML) is one of the most popular serialization
languages. Since many security protocols are built using XML, it also provides cryptographic …

RESTful is not secure

T Yarygina - Applications and Techniques in Information Security …, 2017 - Springer
The shift in web service design towards the REST paradigm has spawned a series of
security concerns. To date there has been no general agreement on how the REST …

Adidos–adaptive and intelligent fully-automatic detection of denial-of-service weaknesses in web services

C Altmeier, C Mainka, J Somorovsky… - Data Privacy Management …, 2016 - Springer
Abstract Denial-of-Service (DoS) attacks aim to affect availability of applications. They can
be executed using several techniques. Most of them are based upon a huge computing …