DROWN: Breaking TLS Using SSLv2
- Nimrod AviramSebastian Schinzel Horst Görtz
- 2016
Computer Science
It is concluded that SSLv2 is not only weak, but actively harmful to the TLS ecosystem.
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
- Robert MergetMarcus BrinkmannNimrod AviramJuraj SomorovskyJohannes MittmannJörg Schwenk
- 2020
Computer Science
This work shows that due to a subtle issue in the key derivation of all TLS-DH(E) cipher suites in versions up to TLS 1.2, the premaster secret of a TLS-DH(E) session may, under certain circumstances, be leaked to an adversary, and describes a fully feasible remote attack against an otherwise-secure TLS configuration: OpenSSL with a 1032-bit DH modulus.
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS
- Nimrod AviramBenjamin DowlingIlan KomargodskiK. PatersonEyal RonenE. Yogev
- 2022
Computer Science
A construction of a dual-PRF that can be used as a drop-in replacement for current heuristic key combiners in a range of protocols and is based on concrete hardness assumptions, phrased in the spirit of one-wayness.
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
- Nimrod AviramKai GellertTibor Jager
- 19 May 2019
Computer Science
A new generic construction that provably provides forward security and replay resilience, based on puncturable pseudorandom functions (PPRFs) is given and it is shown that this construction can immediately be used in TLS 1.3 0-RTT and deployed unilaterally by servers, without requiring any changes to clients or the protocol.
TLS: Vulnerabilities and Improvements - Past, Present and Future
- Nimrod Aviram
- 2020
Computer Science, Engineering
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities
- Robert MergetJuraj Somorovsky Y. Shavitt
- 2019
Computer Science
This work presents the first large-scale scan for CBC padding oracle vulnerabilities in TLS implementations on the modern Internet, detecting vulnerabilities that can be exploited simply by observing the content of different server responses.
Adaptive Probing and Communication in Sensor Networks
- Iftach RagolerYossi MatiasNimrod Aviram
- 22 July 2004
Computer Science, Engineering
A common challenge is in setting the probing frequency, so as to compromise between the cost of frequent probing and the inaccuracy resulting from infrequent probing.
Optimizing Dijkstra for real-world performance
- Nimrod AviramY. Shavitt
- 19 May 2015
Computer Science
An even faster queue design for Dijkstra's algorithm, with results currently put the prototype implementation at about twice as fast as the Boost implementation of the algorithm on both real-world and generated large graphs.