We really need to talk about session tickets: A {Large-Scale} analysis of cryptographic dangers with {TLS} session tickets

S Hebrok, S Nachtigall, M Maehren, N Erinola… - 32nd USENIX Security …, 2023 - usenix.org
Session tickets improve the performance of the TLS protocol. They allow abbreviating the
handshake by using secrets from a previous session. To this end, the server encrypts the …

“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications

M Gruber, C Höfig, M Golla, T Urban… - Proceedings on …, 2022 - petsymposium.org
Mobile child care management applications can help child care facilities, preschools, and
kindergartens to save time and money by allowing their employees to speed up everyday …

How to Measure TLS, X. 509 Certificates, and Web PKI: A Tutorial and Brief Survey

PF Tehrani, E Osterweil, TC Schmidt… - arXiv preprint arXiv …, 2024 - arxiv.org
Transport Layer Security (TLS) is the base for many Internet applications and services to
achieve end-to-end security. In this paper, we provide guidance on how to measure TLS …

Cross Protocol Attack on IPSec-based VPN

S Amaldeep, S Sankaran - 2023 11th International Symposium …, 2023 - ieeexplore.ieee.org
Network layer protocols that provide privacy, such as IPSec, are widely used in Virtual
Private Network (VPN) services to provide security between two networks or hosts. This work …

Exploring the Unknown {DTLS} Universe: Analysis of the {DTLS} Server Ecosystem on the Internet

N Erinola, M Maehren, R Merget… - 32nd USENIX Security …, 2023 - usenix.org
DTLS aims to bring the same security guarantees as TLS to UDP. It is used for latency-
sensitive applications such as VPN, VoIP, video conferencing, and online gaming that can …

CMXsafe: A Proxy Layer for Securing Internet-of-Things Communications

JD de Hoz Diego, T Madi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Security in Internet-of-Things (IoT) environments has become a major concern. This is partly
due to a large number of remotely exploitable IoT vulnerabilities in service authentication …

Interoperability in end-to-end encrypted messaging

J Len, E Ghosh, P Grubbs, P Rösler - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The Digital Markets Act (DMA) is a nascent European Union regulation adopted in
May 2022. One of its most controversial provisions is a requirement that so-called …

Adversarial analysis of ML-based anomaly detection in multi-layer network automation

X Pan, H Yang, Z Xu, Z Zhu - Journal of Lightwave Technology, 2022 - opg.optica.org
The fast development of multi-layer packet-over-optical networks has made network
monitoring and troubleshooting increasingly complicated. This has stimulated people to …

Longitudinal Analysis of Wildcard Certificates in the WebPKI

D Hasselquist, L Bolin, E Carlsson… - 2023 IFIP …, 2023 - ieeexplore.ieee.org
The use of wildcard certificates and multi-domain certificates can impact how sensitive a
certificate is to attacks and how many (sub) domains and machines may be impacted if a …

A Unified Symbolic Analysis of WireGuard

P Lafourcade, D Mahmoud, S Ruhault - Usenix Network and …, 2024 - uca.hal.science
WireGuard [22],[21] is a Virtual Private Network (VPN), presented at NDSS 2017, recently
integrated into the Linux Kernel [57] and paid commercial VPNs such as NordVPN, Mullvad …