Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Blessing, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18226  [pdf, other

    cs.CR

    SoK: Web Authentication in the Age of End-to-End Encryption

    Authors: Jenny Blessing, Daniel Hugenroth, Ross J. Anderson, Alastair R. Beresford

    Abstract: The advent of end-to-end encrypted (E2EE) messaging and backup services has brought new challenges for usable authentication. Compared to regular web services, the nature of E2EE implies that the provider cannot recover data for users who have forgotten passwords or lost devices. Therefore, new forms of robustness and recoverability are required, leading to a plethora of solutions ranging from ran… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2306.07033  [pdf, other

    cs.CR cs.LG

    When Vision Fails: Text Attacks Against ViT and OCR

    Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot

    Abstract: While text-based machine learning models that operate on visual inputs of rendered text have become robust against a wide range of existing attacks, we show that they are still vulnerable to visual adversarial examples encoded as text. We use the Unicode functionality of combining diacritical marks to manipulate encoded text so that small visual perturbations appear when the text is rendered. We s… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

  3. arXiv:2303.14178  [pdf, ps, other

    cs.CY cs.CR

    One Protocol to Rule Them All? On Securing Interoperable Messaging

    Authors: Jenny Blessing, Ross Anderson

    Abstract: European lawmakers have ruled that users on different platforms should be able to exchange messages with each other. Yet messaging interoperability opens up a Pandora's box of security and privacy challenges. While championed not just as an anti-trust measure but as a means of providing a better experience for the end user, interoperability runs the risk of making the user experience worse if poor… ▽ More

    Submitted 9 December, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  4. arXiv:2301.05653  [pdf, other

    cs.CR

    Threat Models over Space and Time: A Case Study of E2EE Messaging Applications

    Authors: Partha Das Chowdhury, Maria Sameen, Jenny Blessing, Nicholas Boucher, Joseph Gardiner, Tom Burrows, Ross Anderson, Awais Rashid

    Abstract: Threat modelling is foundational to secure systems engineering and should be done in consideration of the context within which systems operate. On the other hand, the continuous evolution of both the technical sophistication of threats and the system attack surface is an inescapable reality. In this work, we explore the extent to which real-world systems engineering reflects the changing threat co… ▽ More

    Submitted 28 May, 2023; v1 submitted 13 January, 2023; originally announced January 2023.

  5. arXiv:2107.04940  [pdf, other

    cs.CR

    You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries

    Authors: Jenny Blessing, Michael A. Specter, Daniel J. Weitzner

    Abstract: The security of the Internet rests on a small number of open-source cryptographic libraries: a vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first comprehensive analysis of c… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

  6. arXiv:2005.08427  [pdf, other

    cs.CY cs.CR

    Security Survey and Analysis of Vote-by-Mail Systems

    Authors: Jenny Blessing, Julian Gomez, McCoy Patiño, Tran Nguyen

    Abstract: Voting by mail has been gaining traction for decades in the United States and has emerged as the preferred voting method during the COVID-19 pandemic. In this paper, we examine the security of electronic systems used in the process of voting by mail, including online voter registration and online ballot tracking systems. The goals of these systems, to facilitate voter registration and increase pub… ▽ More

    Submitted 5 September, 2020; v1 submitted 17 May, 2020; originally announced May 2020.