Skip to main content

Showing 1–8 of 8 results for author: Matyas, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.14246  [pdf, other

    cs.CR

    Chain of trust: Unraveling references among Common Criteria certified products

    Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas

    Abstract: With 5394 security certificates of IT products and systems, the Common Criteria for Information Technology Security Evaluation have bred an ecosystem entangled with various kind of relations between the certified products. Yet, the prevalence and nature of dependencies among Common Criteria certified products remains largely unexplored. This study devises a novel method for building the graph of r… ▽ More

    Submitted 25 April, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

  2. arXiv:2311.17603  [pdf, other

    cs.CR

    sec-certs: Examining the security certification practice for better vulnerability mitigation

    Authors: Adam Janovsky, Jan Jancar, Petr Svenda, Łukasz Chmielewski, Jiri Michalik, Vashek Matyas

    Abstract: Products certified under security certification frameworks such as Common Criteria undergo significant scrutiny during the costly certification process. Yet, critical vulnerabilities, including private key recovery (ROCA, Minerva, TPM-Fail...), get discovered in certified products with high assurance levels. Furthermore, assessing which certified products are impacted by such vulnerabilities is co… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  3. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals

    Authors: Lydia Kraus, Valdemar Švábenský, Martin Horák, Vashek Matyáš, Jan Vykopal, Pavel Čeleda

    Abstract: As cyber threats endanger everyone, from regular users to computing professionals, spreading cybersecurity awareness becomes increasingly critical. Therefore, our university designed an innovative cybersecurity awareness course that is freely available online for students, employees, and the general public. The course offers simple, actionable steps that anyone can use to implement defensive count… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Published in ACM ITiCSE 2023 conference proceedings, see https://dl.acm.org/doi/10.1145/3587102.3588862

    ACM Class: K.3

  4. arXiv:2207.11610  [pdf, other

    cs.CR cs.CY

    Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)

    Authors: Martin Ukrop, Lydia Kraus, Vashek Matyas

    Abstract: Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a connection or not. Little is known about perceptions of flawed certificates by IT professionals, even though their decisions impact high numbers of end u… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.

    Journal ref: Digital Threats: Research and Practice, Volume 1, Issue 4, December 2020, Article No.: 25, pp 1-29

  5. arXiv:2205.05573  [pdf, other

    cs.CR

    A Longitudinal Study of Cryptographic API: a Decade of Android Malware

    Authors: Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas, Giorgio Giacinto

    Abstract: Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users' privacy. Various system-based and third-party libraries for Android provide cryptographic functionalities, and previous works mainly explored the misuse of cryptographic API in benign applications. However, the role of cryptograp… ▽ More

    Submitted 6 July, 2022; v1 submitted 11 May, 2022; originally announced May 2022.

    Comments: Fix processing time data

  6. arXiv:2009.06700  [pdf, other

    cs.CR

    Biased RSA private keys: Origin attribution of GCD-factorable keys

    Authors: Adam Janovsky, Matus Nemec, Petr Svenda, Peter Sekan, Vashek Matyas

    Abstract: In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not only public but also private keys are available for the origin attribution - analysis of a source of GCD-factorable keys in IPv4-wide TLS scans and f… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Journal ref: ESORICS 2020, 978-3-030-59013-0, Springer

  7. A Large-Scale Comparative Study of Beta Testers and Standard Users

    Authors: Vlasta Stavova, Lenka Dedkova, Martin Ukrop, Vashek Matyas

    Abstract: Beta testers are the first end users outside a software company to use its product. They have been used for decades and are rightly credited not only with finding and reporting bugs, but also with improving general product usability through their feedback and/or the ways they use the product. In this paper, we investigate whether beta testers represent standard users well enough to allow for the e… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

    Comments: Further paper details available at https://crocs.fi.muni.cz/papers/cacm2018

    Journal ref: Communications of the ACM, Volume 61, Issue 2 (January 2018), pages 64-71

  8. arXiv:1807.00309  [pdf, other

    cs.CR

    Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

    Authors: Milan Broz, Mikulas Patocka, Vashek Matyas

    Abstract: Full Disk Encryption (FDE) has become a widely used security feature. Although FDE can provide confidentiality, it generally does not provide cryptographic data integrity protection. We introduce an algorithm-agnostic solution that provides both data integrity and confidentiality protection at the disk sector layer. Our open-source solution is intended for drives without any special hardware exten… ▽ More

    Submitted 1 July, 2018; originally announced July 2018.