The Undeniable Truth - How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols
Offered By: Black Hat via YouTube
Course Description
Overview
Syllabus
Intro
Outline
Hardware-security mechanisms are pervasive
What is remote attestation?
Attestation requirements
Attestation Protocol
Attestation in practice
Desiderata for messaging protocols
The limits of deniability?
When is (cryptographic) deniability useful?
A new kind of attack
The dangers of undeniable communications
What do deniable protocols look like?
Deniable protocols: Off-the-Record (OTR)
Deniable protocols: Signal Protocol
An overview of our attack
Key point: TEEs let us prove that a key was secret
Modifying a Signal client
The result: an attested transcript
Demo
Switch to online-deniable protocols
Defensive remote attestation
Put the human in the loop
Countermeasures
Not just messaging protocols
Black Hat Sound Bytes
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube