Mel­dun­gen des Lehr­stuhls NDS

AL­PA­CA-At­tack: Cross-Pro­to­col-At­tacks

10.​06.​2021 - Ro­bert Mer­get

In co­ope­ra­ti­on with the uni­ver­si­ty Pa­der­born and Müns­ter Uni­ver­si­ty of Ap­p­lied Sci­en­ce­s­ha­ben, sci­en­tists from the chair of Net­work- and Data se­cu­ri­ty dis­co­ver­ed a new flaw in the spe­ci­fi­ca­ti­on of TLS. The vul­nerabi­li­ty is cal­led AL­PA­CA and ex­ploits a we­ak­ness in the au­then­ti­ca­ti­on of TLS for cross-pro­to­col at­tacks. The at­tack al­lows an at­ta­cker to steal cook­ies or per­form cross-si­te-script­ing (XSS) if the spe­ci­fic con­di­ti­ons for the at­tack are met.

Kom­plet­ter Ar­ti­kel

Quel­le

At­tacks on PDF Cer­ti­fi­ca­ti­on

25.​05.​2021 - Simon Rohl­mann

At the "IEEE Sym­po­si­um on Se­cu­ri­ty and Pri­va­cy 2021" we pu­blis­hed a new paper on PDF se­cu­ri­ty: "Brea­king the Spe­ci­fi­ca­ti­on: PDF Cer­ti­fi­ca­ti­on".

We pre­sent two novel at­tacks on cer­ti­fied do­cu­ments: Sne­aky Si­gna­tu­re and Evil An­no­ta­ti­on At­tack. We also de­mons­tra­te how an at­ta­cker can gain rights to exe­cu­te ar­bi­tra­ry Ja­va­Script code in Adobe Acro­bat.

More in­for­ma­ti­on can be found on pdf-in­se­cu­ri­ty.​org and in our blog­post "At­tacks on PDF Cer­ti­fi­ca­ti­on"

PDF In­se­cu­ri­ty at NDSS 2021

04.​03.​2021 - Vla­dis­lav Mla­de­nov

Re­cent­ly, we have pu­blis­hed two pa­pers on the "NDSS Sym­po­si­um 2021".

Our first paper is "Pro­ces­sing Dan­ge­rous Paths - On Se­cu­ri­ty and Pri­va­cy of the Por­ta­ble Do­cu­ment For­mat" and deals with the se­cu­ri­ty is­su­es in PDF files. In the paper, we an­s­wer the ques­ti­on "What could go wrong if you open a PDF file?".

Our se­cond paper "Shadow At­tacks: Hiding and Re­pla­cing Con­tent in Si­gned PDFs" pres­ents novel at­tacks on PDF si­gna­tu­res. The at­tacks allow the ma­ni­pu­la­ti­on of di­gi­tal­ly si­gned PDF do­cu­ments wi­thout cau­sing any warning by ope­ning the file.

More in­for­ma­ti­on can be found on "pdf-in­se­cu­ri­ty.​org", in our blog­posts ("Blog­post: PDF Dan­ge­rous Paths", "Blog­post: PDF Shadow At­tacks"), and vi­de­os ("Youtu­be: PDF Dan­ge­rous Paths", "Youtu­be: PDF Shadow At­tacks").

Rac­coon At­tack: A new at­tack on TLS

14.​09.​2020 - Ro­bert Mer­get

In Ko­ope­ra­ti­on mit der Uni­ver­si­tät Pa­der­born, der Tel Aviv Uni­ver­si­ty und dem BSI haben NDS Wis­sen­schaft­ler eine neue Schwach­stel­le im TLS Stan­dard ent­deckt. Bei der Schwach­stel­le, wel­che die For­scher "Rac­coon" ge­tauft haben, han­delt es sich um eine Ti­ming Schwach­stel­len in der Spe­zi­fi­ka­ti­on von TLS. Mit­tels neuer Tech­ni­ken kön­nen unter ge­wis­sen Um­stän­den TLS-DH(E) Ver­bin­dun­gen ent­schlüs­selt wer­den. Mehr In­for­ma­tio­nen fin­den sie auf https://rac­coon-at­tack.​com

Quel­le

T0RTT at PETS 2020

30.​03.​2020 - Se­bas­ti­an Lauer

In co­ope­ra­ti­on with sci­en­tists from the Uni­ver­si­ties of Pa­der­born and Wup­per­tal we have pu­blis­hed the paper "T0RTT: Non-In­ter­ac­tive Im­me­dia­te For­ward-Se­cu­re Sin­gle-Pass Cir­cuit Con­struc­tion" at the 20th Pri­va­cy En­han­cing Tech­no­lo­gies Sym­po­si­um.

Our paper deals with the ques­ti­on whe­ther it is pos­si­ble to speed up the cir­cuit con­struc­tion in Tor wi­thout sa­cri­fi­cing se­cu­ri­ty pro­per­ties such as for­ward se­cu­ri­ty.

More infos can be found "here"

zum Nach­rich­ten­ar­chiv