Главная
Study mode:
on
1
Intro
2
Agile Cryptographic Protocols
3
Transport Layer Security (1994)
4
TLS protocol overview
5
RSA Key Transport
6
(EC)DHE Key Exchange
7
Composing Key Exchanges
8
TLS State Machine
9
OpenSSL State Machine
10
Fuzzing TLS
11
Culprit: Underspecified State Machine
12
Composing with Optional Messages
13
SKIP: Server Impersonation with DHE
14
Export-Grade RSA in TLS
15
FREAK: Downgrade to RSA EXPORT
16
FREAK: Exploit and Impact
17
A Verified State Machine for OpenSSL
18
Conclusions Cryptographic protocol testing needs work
Description:
Explore a comprehensive analysis of the Transport Layer Security (TLS) protocol's composite state machines in this IEEE conference talk. Delve into the challenges of designing robust state machines that correctly handle various protocol versions, extensions, authentication modes, and key exchange methods. Discover critical security vulnerabilities uncovered through systematic testing of popular open-source TLS implementations, including the FREAK flaw. Learn about the importance of formal verification for cryptographic protocol libraries and examine the first verified implementation of a composite TLS state machine in C. Gain insights into the complexities of TLS protocol design, the impact of state machine bugs, and the need for improved cryptographic protocol testing.

A Messy State of the Union - Taming the Composite State Machines of TLS

IEEE
Add to list