Skip to main content

Showing 1–8 of 8 results for author: Aura, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.15323  [pdf, other

    cs.CR

    Security Analysis of the Consumer Remote SIM Provisioning Protocol

    Authors: Abu Shohel Ahmed, Aleksi Peltonen, Mohit Sethi, Tuomas Aura

    Abstract: Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the… ▽ More

    Submitted 22 August, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: 35 pages, 9 figures, Associated ProVerif model files located at https://github.com/peltona/rsp_model

  2. arXiv:2005.05110  [pdf, other

    cs.CR cs.NI

    Threat modeling framework for mobile communication systems

    Authors: Siddharth Prakash Rao, Silke Holtmanns, Tuomas Aura

    Abstract: Due to the complex nature of mobile communication systems, most of the security efforts in its domain are isolated and scattered across underlying technologies. This has resulted in an obscure view of the overall security. In this work, we attempt to fix this problem by proposing a domain-specific threat modeling framework. By gleaning from a diverse and large body of security literature, we syste… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  3. arXiv:1912.04669  [pdf, other

    cs.CR

    Client-side Vulnerabilities in Commercial VPNs

    Authors: Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura

    Abstract: Internet users increasingly rely on commercial virtual private network (VPN) services to protect their security and privacy. The VPN services route the client's traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client's real IP address from online services, and they also shield the user's connections from perceived threats in the access networks. In this paper, we… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: A refined version of this draft, with the same title, has been published in the 24th Nordic Conference on Secure IT Systems (NordSec 19). It is accessible here: https://link.springer.com/chapter/10.1007/978-3-030-35055-0_7

  4. arXiv:1911.12332  [pdf, other

    cs.CR

    XSS Vulnerabilities in Cloud-Application Add-Ons

    Authors: Thanh Bui, Siddharth Rao, Markku Antikainen, Tuomas Aura

    Abstract: Cloud-application add-ons are microservices that extend the functionality of the core applications. Many application vendors have opened their APIs for third-party developers and created marketplaces for add-ons (also add-ins or apps). This is a relatively new phenomenon, and its effects on the application security have not been widely studied. It seems likely that some of the add-ons have lower c… ▽ More

    Submitted 27 November, 2019; originally announced November 2019.

  5. Misbinding Attacks on Secure Device Pairing and Bootstrapping

    Authors: Mohit Sethi, Aleksi Peltonen, Tuomas Aura

    Abstract: In identity misbinding attacks against authenticated key-exchange protocols, a legitimate but compromised participant manipulates the honest parties so that the victim becomes unknowingly associated with a third party. These attacks are well known, and resistance to misbinding is considered a critical requirement for security protocols on the Internet. In the context of device pairing, on the othe… ▽ More

    Submitted 31 May, 2019; v1 submitted 20 February, 2019; originally announced February 2019.

    Comments: ACM ASIA CCS

  6. arXiv:1708.03468  [pdf, other

    cs.CR

    Key exchange with the help of a public ledger

    Authors: Thanh Bui, Tuomas Aura

    Abstract: Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help… ▽ More

    Submitted 11 August, 2017; originally announced August 2017.

  7. arXiv:1707.06071  [pdf, other

    cs.SI

    Malware distributions and graph structure of the Web

    Authors: Sanja Šćepanović, Igor Mishkovski, Jukka Ruohonen, Frederick Ayala-Gómez, Tuomas Aura, Sami Hyrynsalmi

    Abstract: Knowledge about the graph structure of the Web is important for understanding this complex socio-technical system and for devising proper policies supporting its future development. Knowledge about the differences between clean and malicious parts of the Web is important for understanding potential treats to its users and for devising protection mechanisms. In this study, we conduct data science m… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.

  8. arXiv:1608.06592  [pdf, other

    cs.CR

    Application of Public Ledgers to Revocation in Distributed Access Control

    Authors: Thanh Bui, Tuomas Aura

    Abstract: There has recently been a flood of interest in potential new applications of blockchains, as well as proposals for more generic designs called public ledgers. Most of the novel proposals have been in the financial sector. However, the public ledger is an abstraction that solves several of the fundamental problems in the design of secure distributed systems: global time in the form of a strict line… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.