Главная
Study mode:
on
1
Intro
2
Minimizing Latency
3
What is QUIC?
4
Setup Time: QUIC vs TLS
5
Starting Data Exchange: QUIC vs TLS
6
Main Questions We Address
7
Summary of Our Results
8
Outline
9
QUIC Protocol
10
Security Analysis Main Challenges
11
How Secure is QUIC?
12
Performance Attack Overview
13
Attacks We Have Implemented
14
Summary and Future Work
Description:
Explore a comprehensive analysis of QUIC, Google's secure transport protocol, in this IEEE Symposium on Security & Privacy conference talk. Delve into the provable security and performance guarantees of QUIC in the presence of attackers. Examine the protocol's strengths and weaknesses, including its security model, forward secrecy limitations, and vulnerability to bit-flipping and replay attacks. Learn about practical implementations of these attacks and their impact on QUIC's latency advantages. Investigate the trade-offs between minimizing latency and providing robust security guarantees in performance-driven protocols. Gain insights into QUIC's protocol structure, security analysis challenges, and potential areas for future improvements in secure, low-latency transport protocols.

How Secure and Quick is QUIC? Provable Security and Performance Analyses

IEEE
Add to list
0:00 / 0:00