2014
DOI: 10.1109/msp.2014.66
|View full text |Cite
|
Sign up to set email alerts
|

Heartbleed 101

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(23 citation statements)
references
References 0 publications
0
22
0
Order By: Relevance
“…It was designed to give protection against the aforementioned problems, offering authentication, data integrity, and confidentiality through asymmetric and symmetric cryptography. In the recent past, protocol weaknesses such as Padding Oracle On Downgraded Legacy Encryption [14], Browser Exploit Against SSL and TLS, Factoring RSA Export Keys, and others, as well as implementation problems such as Heartbleed [15,16] and Apple’s goto fail bug [17] have arisen. The use of older protocol versions or deprecated implementations can lead to these or other issues surfacing and compromising the security and privacy of users.…”
Section: Introductionmentioning
confidence: 99%
“…It was designed to give protection against the aforementioned problems, offering authentication, data integrity, and confidentiality through asymmetric and symmetric cryptography. In the recent past, protocol weaknesses such as Padding Oracle On Downgraded Legacy Encryption [14], Browser Exploit Against SSL and TLS, Factoring RSA Export Keys, and others, as well as implementation problems such as Heartbleed [15,16] and Apple’s goto fail bug [17] have arisen. The use of older protocol versions or deprecated implementations can lead to these or other issues surfacing and compromising the security and privacy of users.…”
Section: Introductionmentioning
confidence: 99%
“…Heart beat Request posts are a one-byte type field, a two-byte. Pay load field, a payload field and at least 16 bytes of random padding [5]. A solution against the Heart bleed vulnerability is a mechanism to check that the response is not longer than the request.…”
Section: Iiiii Threats Against Ldapmentioning
confidence: 99%
“…Either endpoint may send a HeartbeatRequest signal after negotiation to check connectivity. HeartbeatRequest posts are a one-byte type field, a two-byte payload field, a payload field and at least 16 bytes of random padding [5]. A solution against the Heartbleed vulnerability is a mechanism to check that the response is not longer than the request.…”
Section: Threats Against Ldapmentioning
confidence: 99%