Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Wetzels, Jos"'
We inspected 45 actively deployed Operational Technology (OT) product families from ten major vendors and found that every system suffers from at least one trivial vulnerability. We reported a total of 53 weaknesses, stemming from insecure by design
Externí odkaz:
http://arxiv.org/abs/2303.12340
The continuing use of proprietary cryptography in embedded systems across many industry verticals, from physical access control systems and telecommunications to machine-to-machine authentication, presents a significant obstacle to black-box security
Externí odkaz:
http://arxiv.org/abs/2009.04274
Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. Yet this constrained environment poses unique design and implementation challenges that significantly complicate the
Externí odkaz:
http://arxiv.org/abs/2007.02307
Autor:
Wetzels, Jos
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties.
Comment: 17 pages
Comment: 17 pages
Externí odkaz:
http://arxiv.org/abs/1602.03097
Autor:
Wetzels, Jos, Bokslag, Wouter
In this document we present an introductory overview of the algorithms and design components underlying the Keccac cryptographic primitive and the Keyak encryption scheme for authenticated (session-supporting) encryption. This document aims to famili
Externí odkaz:
http://arxiv.org/abs/1510.02856
Autor:
Wetzels, Jos, Bokslag, Wouter
In this paper we will present various hardware architecture designs for implementing the SIMON 64/128 block cipher as a cryptographic component offering encryption, decryption and self-contained key-scheduling capabilities and discuss the issues and
Externí odkaz:
http://arxiv.org/abs/1507.06368
Autor:
Wetzels, Jos
In this paper, we will provide an overview of the current state-of-the-art with regards to so-called cold boot attacks, their practical applicability and feasibility, potential counter-measures and their effectiveness.
Comment: 26 pages
Comment: 26 pages
Externí odkaz:
http://arxiv.org/abs/1408.0725
Autor:
Wetzels, Jos
This paper presents an overview of the current state-of-the-art of security and privacy concerns regarding RFID-based car key applications. We will first present a general overview of the technology and its evolution before moving on to an overview a
Externí odkaz:
http://arxiv.org/abs/1405.7424
Autor:
Abbasi, Ali, Wetzels, Jos, Bokslag, Wouter, Zambon, Emmanuele, Etalle, Sandro, Yan, Zheng, Molva, Refik, Mazurczyk, Wojciech, Kantola, Raimo
Publikováno v:
Network and System Security-11th International Conference, NSS 2017, Proceedings, 694-709
STARTPAGE=694;ENDPAGE=709;TITLE=Network and System Security-11th International Conference, NSS 2017, Proceedings
Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings, 694-709
STARTPAGE=694;ENDPAGE=709;TITLE=Network and System Security
STARTPAGE=694;ENDPAGE=709;TITLE=Network and System Security-11th International Conference, NSS 2017, Proceedings
Network and System Security: 11th International Conference, NSS 2017, Helsinki, Finland, August 21–23, 2017, Proceedings, 694-709
STARTPAGE=694;ENDPAGE=709;TITLE=Network and System Security
Embedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical environment constitute a significant security and safety r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::312927fb764f410029bec085af7913ac
https://research.tue.nl/nl/publications/8254aafd-7eab-4c7a-bfe4-3c0bca5f65f6
https://research.tue.nl/nl/publications/8254aafd-7eab-4c7a-bfe4-3c0bca5f65f6
Publikováno v:
Research in Attacks, Intrusions & Defenses: 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings; 2014, p384-404, 21p