Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Künnemann, Robert"'
Autor:
Künnemann, Robert, Biehl, Julian
Proof-of-concept exploits help demonstrate software vulnerability beyond doubt and communicate attacks to non-experts. But exploits can be configuration-specific, for example when in Security APIs, where keys are set up specifically for the applicati
Externí odkaz:
http://arxiv.org/abs/2410.01568
Autor:
Morio, Kevin, Künnemann, Robert
There exists a verification gap between formal protocol specifications and their actual implementations, which this work aims to bridge via monitoring for compliance to the formal specification. We instrument the networking and cryptographic library
Externí odkaz:
http://arxiv.org/abs/2409.02918
Publikováno v:
Proceedings of the 2024 IEEE Computer Security Foundations Symposium (CSF)
Universal Composability (UC) is the gold standard for cryptographic security, but mechanizing proofs of UC is notoriously difficult. A recently-discovered connection between UC and Robust Compilation (RC)$\unicode{x2014}$a novel theory of secure comp
Externí odkaz:
http://arxiv.org/abs/2401.15041
We introduce CryptoBap, a platform to verify weak secrecy and authentication for the (ARMv8 and RISC-V) machine code of cryptographic protocols. We achieve this by first transpiling the binary of protocols into an intermediate representation and then
Externí odkaz:
http://arxiv.org/abs/2308.14450
We present the first formal analysis and comparison of the security of the two most widely deployed exposure notification systems, ROBERT and the Google and Apple Exposure Notification (GAEN) framework. ROBERT is the most popular instalment of the ce
Externí odkaz:
http://arxiv.org/abs/2210.00649
The internet is a major distribution platform for web applications, but there are no effective transparency and audit mechanisms in place for the web. Due to the ephemeral nature of web applications, a client visiting a website has no guarantee that
Externí odkaz:
http://arxiv.org/abs/2202.09795
Autor:
Dax, Alexander, Künnemann, Robert
Companies and network operators perform risk assessment to inform policy-making, guide infrastructure investments or to comply with security standards such as ISO 27001. Due to the size and complexity of these networks, risk assessment techniques suc
Externí odkaz:
http://arxiv.org/abs/2105.06731
Autor:
Morio, Kevin, Künnemann, Robert
Publikováno v:
IEEE CSF 2021, Vol. 1, p. 327-342
Little can be achieved in the design of security protocols without trusting at least some participants. This trust should be justified or, at the very least, subject to examination. One way to strengthen trustworthiness is to hold parties accountable
Externí odkaz:
http://arxiv.org/abs/2006.12047
Astroturfing, i.e., the fabrication of public discourse by private or state-controlled sponsors via the creation of fake online accounts, has become incredibly widespread in recent years. It gives a disproportionally strong voice to wealthy and techn
Externí odkaz:
http://arxiv.org/abs/2004.08836
Publikováno v:
EPTCS 308, 2019, pp. 32-46
Causality has been the issue of philosophic debate since Hippocrates. It is used in formal verification and testing, e.g., to explain counterexamples or construct fault trees. Recent work defines actual causation in terms of Pearl's causality framewo
Externí odkaz:
http://arxiv.org/abs/1910.14219