A Messy State of the Union - Taming the Composite State Machines of TLS

A Messy State of the Union - Taming the Composite State Machines of TLS

IEEE Symposium on Security and Privacy via YouTube Direct link

Agile Cryptographic Protocols

2 of 18

2 of 18

Agile Cryptographic Protocols

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Messy State of the Union - Taming the Composite State Machines of TLS

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agile Cryptographic Protocols
  3. 3 Transport Layer Security (1994)
  4. 4 TLS protocol overview
  5. 5 RSA Key Transport
  6. 6 (EC)DHE Key Exchange
  7. 7 Composing Key Exchanges
  8. 8 TLS State Machine
  9. 9 OpenSSL State Machine
  10. 10 Fuzzing TLS
  11. 11 Culprit: Underspecified State Machine
  12. 12 Composing with Optional Messages
  13. 13 SKIP: Server Impersonation with DHE
  14. 14 Export-Grade RSA in TLS
  15. 15 FREAK: Downgrade to RSA EXPORT
  16. 16 FREAK: Exploit and Impact
  17. 17 A Verified State Machine for OpenSSL
  18. 18 Conclusions Cryptographic protocol testing needs work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.