Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Matyás, Vashek"'
With 5394 security certificates of IT products and systems, the Common Criteria for Information Technology Security Evaluation have bred an ecosystem entangled with various kind of relations between the certified products. Yet, the prevalence and nat
Externí odkaz:
http://arxiv.org/abs/2404.14246
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
Computers & Security, Volume 143, 2024, 103895, ISSN 0167-4048
Products certified under security certification frameworks such as Common Criteria undergo significant scrutiny during the costly certification process. Yet, critical vulnerabilities, including private key recovery (ROCA, Minerva, TPM-Fail...), get d
Externí odkaz:
http://arxiv.org/abs/2311.17603
Autor:
Kraus, Lydia, Švábenský, Valdemar, Horák, Martin, Matyáš, Vashek, Vykopal, Jan, Čeleda, Pavel
As cyber threats endanger everyone, from regular users to computing professionals, spreading cybersecurity awareness becomes increasingly critical. Therefore, our university designed an innovative cybersecurity awareness course that is freely availab
Externí odkaz:
http://arxiv.org/abs/2307.07608
Publikováno v:
Digital Threats: Research and Practice, Volume 1, Issue 4, December 2020, Article No.: 25, pp 1-29
Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a con
Externí odkaz:
http://arxiv.org/abs/2207.11610
Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users' privacy. Various system-based and third-party libraries for Android provide cry
Externí odkaz:
http://arxiv.org/abs/2205.05573
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
In Computers & Security August 2024 143
Autor:
Kruzikova, Agata, Muzik, Michal, Knapova, Lenka, Dedkova, Lenka, Smahel, David, Matyas, Vashek
Publikováno v:
In Computers & Security March 2024 138
Publikováno v:
ESORICS 2020, 978-3-030-59013-0, Springer
In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not
Externí odkaz:
http://arxiv.org/abs/2009.06700