Author:
Alashwali Eman Salem,Rasmussen Kasper
Publisher
Springer International Publishing
Reference34 articles.
1. CVE-2015-3197 (2015).
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197
2. Adrian, D., et al.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: Proceedings of Conference on Computer and Communications Security (CCS), pp. 5–17 (2015)
3. Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: Proceedings of USENIX Security Symposium, pp. 689–706 (2016)
4. Beurdouche, B., et al.: A Messy state of the union: taming the composite state machines of TLS. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 535–552 (2015)
5. Bhargavan, K., Brzuska, C., Fournet, C., Green, M., Kohlweiss, M., Zanella-Béguelin, S.: Downgrade resilience in key-exchange protocols. In: Proceedings of IEEE Symposium on Security and Privacy (SP), pp. 506–525 (2016)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Verify-Pro: A Framework for Server Authentication using Communication Protocol Dialects;MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM);2022-11-28
2. Verify-Pro: A Framework for Server Authentication Using Communication Protocol Dialects;MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM);2022-11-28
3. Strengthening SDN Security: Protocol Dialecting and Downgrade Attacks;2021 IEEE 7th International Conference on Network Softwarization (NetSoft);2021-06-28
4. Return of version downgrade attack in the era of TLS 1.3;Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies;2020-11-23
5. Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks;Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security;2020-10-30