{"title":"Attacks on devices using SSL/TLS","authors":"V. Platenka, A. Mazalek, Z. Vranova","doi":"10.1109/ICMT52455.2021.9502818","DOIUrl":null,"url":null,"abstract":"Security and reliability are currently the most important aspects of communication systems. This has led us to focus on the issues associated with Padding Oracle Attack. Our aim is to improve the teaching of this subject to students in the field of Communication and Information Systems. A model of the attack has been created in the application CipherCAD. This model makes it possible to monitor the development of the attack over time, measure its difficulty and amend any part of the conditions. Models have also been created of the connections using various versions of the SSL/TLS protocol. Randomly-selected servers have been tested using the models created. The aim of the tests was to reveal a badly-implemented protocol which allowed the attack to take place.","PeriodicalId":276923,"journal":{"name":"2021 International Conference on Military Technologies (ICMT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Military Technologies (ICMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMT52455.2021.9502818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security and reliability are currently the most important aspects of communication systems. This has led us to focus on the issues associated with Padding Oracle Attack. Our aim is to improve the teaching of this subject to students in the field of Communication and Information Systems. A model of the attack has been created in the application CipherCAD. This model makes it possible to monitor the development of the attack over time, measure its difficulty and amend any part of the conditions. Models have also been created of the connections using various versions of the SSL/TLS protocol. Randomly-selected servers have been tested using the models created. The aim of the tests was to reveal a badly-implemented protocol which allowed the attack to take place.