Zum Hauptinhalt springen

Showing 1–10 of 10 results for author: Kostiainen, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.06956  [pdf, other

    cs.CR cs.DC

    PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments

    Authors: Carolin Beer, Sheila Zingg, Kari Kostiainen, Karl Wüst, Vedran Capkun, Srdjan Capkun

    Abstract: The European Central Bank is preparing for the potential issuance of a central bank digital currency (CBDC), called the digital euro. A recent regulatory proposal by the European Commission defines several requirements for the digital euro, such as support for both online and offline payments. Offline payments are expected to enable cash-like privacy, local payment settlement, and the enforcement… ▽ More

    Submitted 13 August, 2024; originally announced August 2024.

  2. arXiv:2112.07498  [pdf, other

    cs.CR cs.HC

    Phishing in Organizations: Findings from a Large-Scale and Long-Term Study

    Authors: Daniele Lain, Kari Kostiainen, Srdjan Capkun

    Abstract: In this paper, we present findings from a large-scale and long-term phishing experiment that we conducted in collaboration with a partner company. Our experiment ran for 15 months during which time more than 14,000 study participants (employees of the company) received different simulated phishing emails in their normal working context. We also deployed a reporting button to the company's email cl… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Comments: To appear in IEEE S&P 2022

  3. arXiv:2010.14417  [pdf, other

    cs.CR

    2FE: Two-Factor Encryption for Cloud Storage

    Authors: Anders Dalskov, Daniele Lain, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun

    Abstract: Encrypted cloud storage services are steadily increasing in popularity, with many commercial solutions currently available. In such solutions, the cloud storage is trusted for data availability, but not for confidentiality. Additionally, the user's device is considered secure, and the user is expected to behave correctly. We argue that such assumptions are not met in reality: e.g., users routine… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: 18 pages, 7 figures

  4. Composite Enclaves: Towards Disaggregated Trusted Execution

    Authors: Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun

    Abstract: The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized hardware, which is readily available across modern datacenters through disaggregated infrastructure. On the other hand, trusted execution environments (TEEs), one of the most promising recent developments in hardware security, can only protect code confined in the CPU, limiting TEEs' potential and appl… ▽ More

    Submitted 15 November, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

    Journal ref: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022 (1)

  5. arXiv:2001.01278  [pdf, other

    cs.CR cs.DC

    Snappy: Fast On-chain Payments with Practical Collaterals

    Authors: Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun

    Abstract: Permissionless blockchains offer many advantages but also have significant limitations including high latency. This prevents their use in important scenarios such as retail payments, where merchants should approve payments fast. Prior works have attempted to mitigate this problem by moving transactions off the chain. However, such Layer-2 solutions have their own problems: payment channels require… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

    Comments: Network and Distributed Systems Security (NDSS) Symposium 2020, 23-26 February 2020, San Diego, CA, USA

  6. arXiv:1804.07391  [pdf, other

    cs.CR cs.DC

    Don't Mine, Wait in Line: Fair and Efficient Blockchain Consensus with Robust Round Robin

    Authors: Mansoor Ahmed-Rengers, Kari Kostiainen

    Abstract: Proof-of-Stake systems randomly choose, on each round, one of the participants as a consensus leader that extends the chain with the next block such that the selection probability is proportional to the owned stake. However, distributed random number generation is notoriously difficult. Systems that derive randomness from the previous blocks are completely insecure; solutions that provide secure r… ▽ More

    Submitted 18 May, 2020; v1 submitted 19 April, 2018; originally announced April 2018.

  7. DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

    Authors: Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi

    Abstract: Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks. In this paper, we propo… ▽ More

    Submitted 23 September, 2019; v1 submitted 28 September, 2017; originally announced September 2017.

    Journal ref: Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC 2019)

  8. arXiv:1702.07521  [pdf, other

    cs.CR

    Software Grand Exposure: SGX Cache Attacks Are Practical

    Authors: Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi

    Abstract: Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns. Consequently, various recent research efforts are actively seeking countermeasures to SGX side-channel attacks. It is widely assumed that SGX may be vulnerable to other side channels, such as cache… ▽ More

    Submitted 24 February, 2017; originally announced February 2017.

  9. arXiv:1604.04723  [pdf, other

    cs.CR

    Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals

    Authors: Luka Malisa, Kari Kostiainen, Thomas Knell, David Sommer, Srdjan Capkun

    Abstract: Many terminals are used in safety-critical operations in which humans, through terminal user interfaces, become a part of the system control loop (e.g., medical and industrial systems). These terminals are typically embedded, single-purpose devices with restricted functionality, sometimes air-gapped and increasingly hardened. We describe a new way of attacking such terminals in which an adversar… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.

  10. arXiv:1502.06824  [pdf, other

    cs.CR

    Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms

    Authors: Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun

    Abstract: Phishing in mobile applications is a relevant threat with successful attacks reported in the wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal user credentials. In this paper we categorize application phishing attacks in mobile platforms and possible countermeasures. We show that personalized security indicators can help users to detect phishing attacks an… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.