Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Matyas, Vashek"'
With 5394 security certificates of IT products and systems, the Common Criteria for Information Technology Security Evaluation have bred an ecosystem entangled with various kind of relations between the certified products. Yet, the prevalence and nat
Externí odkaz:
http://arxiv.org/abs/2404.14246
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
Computers & Security, Volume 143, 2024, 103895, ISSN 0167-4048
Products certified under security certification frameworks such as Common Criteria undergo significant scrutiny during the costly certification process. Yet, critical vulnerabilities, including private key recovery (ROCA, Minerva, TPM-Fail...), get d
Externí odkaz:
http://arxiv.org/abs/2311.17603
Autor:
Kraus, Lydia, Švábenský, Valdemar, Horák, Martin, Matyáš, Vashek, Vykopal, Jan, Čeleda, Pavel
As cyber threats endanger everyone, from regular users to computing professionals, spreading cybersecurity awareness becomes increasingly critical. Therefore, our university designed an innovative cybersecurity awareness course that is freely availab
Externí odkaz:
http://arxiv.org/abs/2307.07608
Publikováno v:
Digital Threats: Research and Practice, Volume 1, Issue 4, December 2020, Article No.: 25, pp 1-29
Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a con
Externí odkaz:
http://arxiv.org/abs/2207.11610
Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users' privacy. Various system-based and third-party libraries for Android provide cry
Externí odkaz:
http://arxiv.org/abs/2205.05573
Autor:
Janovsky, Adam, Jancar, Jan, Svenda, Petr, Chmielewski, Łukasz, Michalik, Jiri, Matyas, Vashek
Publikováno v:
In Computers & Security August 2024 143
Autor:
Kruzikova, Agata, Muzik, Michal, Knapova, Lenka, Dedkova, Lenka, Smahel, David, Matyas, Vashek
Publikováno v:
In Computers & Security March 2024 138
Publikováno v:
ESORICS 2020, 978-3-030-59013-0, Springer
In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not
Externí odkaz:
http://arxiv.org/abs/2009.06700
Publikováno v:
Communications of the ACM, Volume 61, Issue 2 (January 2018), pages 64-71
Beta testers are the first end users outside a software company to use its product. They have been used for decades and are rightly credited not only with finding and reporting bugs, but also with improving general product usability through their fee
Externí odkaz:
http://arxiv.org/abs/1811.07053
Full Disk Encryption (FDE) has become a widely used security feature. Although FDE can provide confidentiality, it generally does not provide cryptographic data integrity protection. We introduce an algorithm-agnostic solution that provides both data
Externí odkaz:
http://arxiv.org/abs/1807.00309