Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2016
Function Secret Sharing: Improvements and Extensions
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1292–1303https://doi.org/10.1145/2976749.2978429Function Secret Sharing (FSS), introduced by Boyle et al. (Eurocrypt 2015), provides a way for additively secret-sharing a function from a given function family F. More concretely, an m-party FSS scheme splits a function f : {0, 1}n -> G, for some ...
- research-articleOctober 2016
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
- Joppe Bos,
- Craig Costello,
- Leo Ducas,
- Ilya Mironov,
- Michael Naehrig,
- Valeria Nikolaenko,
- Ananth Raghunathan,
- Douglas Stebila
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1006–1018https://doi.org/10.1145/2976749.2978425Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following increasing interest from both companies and government agencies in building quantum computers, a number of works have ...
- research-articleOctober 2016
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1580–1590https://doi.org/10.1145/2976749.2978412Multi-User MIMO has attracted much attention due to its significant advantage of increasing the utilization ratio of wireless channels. Recently a serious eavesdropping attack, which exploits the CSI feedback of the FDD system, is discovered in MU-MIMO ...
- research-articleOctober 2016
Systematic Fuzzing and Testing of TLS Libraries
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1492–1504https://doi.org/10.1145/2976749.2978411We present TLS-Attacker, an open source framework for evaluating the security of TLS libraries. TLS-Attacker allows security engineers to create custom TLS message flows and arbitrarily modify message contents using a simple interface in order to test ...
- research-articleOctober 2016
The Honey Badger of BFT Protocols
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 31–42https://doi.org/10.1145/2976749.2978399The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical applications, such as financial transactions. Although the conventional ...
- research-articleOctober 2016
A Systematic Analysis of the Juniper Dual EC Incident
- Stephen Checkoway,
- Jacob Maskiewicz,
- Christina Garman,
- Joshua Fried,
- Shaanan Cohney,
- Matthew Green,
- Nadia Heninger,
- Ralf-Philipp Weinmann,
- Eric Rescorla,
- Hovav Shacham
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 468–479https://doi.org/10.1145/2976749.2978395In December 2015, Juniper Networks announced multiple security vulnerabilities stemming from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers. The more sophisticated of these vulnerabilities was a passive VPN ...
- research-articleOctober 2016
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1516–1527https://doi.org/10.1145/2976749.2978394The Host header is a security-critical component in an HTTP request, as it is used as the basis for enforcing security and caching policies. While the current specification is generally clear on how host-related protocol fields should be parsed and ...
- research-articleOctober 2016
A Secure Sharding Protocol For Open Blockchains
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 17–30https://doi.org/10.1145/2976749.2978389Cryptocurrencies, such as Bitcoin and 250 similar alt-coins, embody at their core a blockchain protocol --- a mechanism for a distributed network of computational nodes to periodically agree on a set of new transactions. Designing a secure blockchain ...
- research-articleOctober 2016
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1192–1203https://doi.org/10.1145/2976749.2978375Password authentication still constitutes the most widespread authentication concept on the Internet today, but the human incapability to memorize safe passwords has left this concept vulnerable to various attacks ever since. Affected enterprises such ...
- research-articleOctober 2016
Identity-Concealed Authenticated Encryption and Key Exchange
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1464–1479https://doi.org/10.1145/2976749.2978350Identity concealment and zero-round trip time (0-RTT) connection are two of current research focuses in the design and analysis of secure transport protocols, like TLS1.3 and Google's QUIC, in the client-server setting. In this work, we introduce a new ...
- research-articleOctober 2016
POPE: Partial Order Preserving Encoding
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1131–1142https://doi.org/10.1145/2976749.2978345Recently there has been much interest in performing search queries over encrypted data to enable functionality while protecting sensitive data. One particularly efficient mechanism for executing such queries is order-preserving encryption/encoding (OPE) ...
- research-articleOctober 2016
SANA: Secure and Scalable Aggregate Network Attestation
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 731–742https://doi.org/10.1145/2976749.2978335Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating our environments (homes, factories, cars, and also our body - with wearable devices) to collect data and act on the insight derived. Ensuring software ...
- research-articleOctober 2016
MPC-Friendly Symmetric Key Primitives
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 430–443https://doi.org/10.1145/2976749.2978332We discuss the design of symmetric primitives, in particular Pseudo-Random Functions (PRFs) which are suitable for use in a secret-sharing based MPC system. We consider three different PRFs: the Naor-Reingold PRF, a PRF based on the Legendre symbol, and ...
- research-articleOctober 2016
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1438–1450https://doi.org/10.1145/2976749.2978325We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compiler and characterize the UA protocols that the ...
- research-articleOctober 2016
Safely Measuring Tor
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1553–1567https://doi.org/10.1145/2976749.2978310Tor is a popular network for anonymous communication. The usage and operation of Tor is not well-understood, however, because its privacy goals make common measurement approaches ineffective or risky. We present PrivCount, a system for measuring the Tor ...
- research-articleOctober 2016
∑oφoς: Forward Secure Searchable Encryption
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, Pages 1143–1154https://doi.org/10.1145/2976749.2978303Searchable Symmetric Encryption aims at making possible searching over an encrypted database stored on an untrusted server while keeping privacy of both the queries and the data, by allowing some small controlled leakage to the server. Recent work shows ...