Completed
When is (cryptographic) deniability useful?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Undeniable Truth - How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 Hardware-security mechanisms are pervasive
- 4 What is remote attestation?
- 5 Attestation requirements
- 6 Attestation Protocol
- 7 Attestation in practice
- 8 Desiderata for messaging protocols
- 9 The limits of deniability?
- 10 When is (cryptographic) deniability useful?
- 11 A new kind of attack
- 12 The dangers of undeniable communications
- 13 What do deniable protocols look like?
- 14 Deniable protocols: Off-the-Record (OTR)
- 15 Deniable protocols: Signal Protocol
- 16 An overview of our attack
- 17 Key point: TEEs let us prove that a key was secret
- 18 Modifying a Signal client
- 19 The result: an attested transcript
- 20 Demo
- 21 Switch to online-deniable protocols
- 22 Defensive remote attestation
- 23 Put the human in the loop
- 24 Countermeasures
- 25 Not just messaging protocols
- 26 Black Hat Sound Bytes