The Undeniable Truth - How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Outline
Hardware-security mechanisms are pervasive
What is remote attestation?
Attestation requirements
Attestation Protocol
Attestation in practice
Desiderata for messaging protocols
The limits of deniability?
When is (cryptographic) deniability useful?
A new kind of attack
The dangers of undeniable communications
What do deniable protocols look like?
Deniable protocols: Off-the-Record (OTR)
Deniable protocols: Signal Protocol
An overview of our attack
Key point: TEEs let us prove that a key was secret
Modifying a Signal client
The result: an attested transcript
Demo
Switch to online-deniable protocols
Defensive remote attestation
Put the human in the loop
Countermeasures
Not just messaging protocols
Black Hat Sound Bytes
Taught by
Black Hat
Related Courses
Exploring Modern and Secure Operations of Kubernetes Clusters on the EdgeOpen Data Science via YouTube Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube