Meldungen des Lehrstuhls NDS

ALPACA-Attack: Cross-Protocol-Attacks

10.06.2021 - Robert Merget

In cooperation with the university Paderborn and Münster University of Applied Scienceshaben, scientists from the chair of Network- and Data security discovered a new flaw in the specification of TLS. The vulnerability is called ALPACA and exploits a weakness in the authentication of TLS for cross-protocol attacks. The attack allows an attacker to steal cookies or perform cross-site-scripting (XSS) if the specific conditions for the attack are met.

Kompletter Artikel


Attacks on PDF Certification

25.05.2021 - Simon Rohlmann

At the "IEEE Symposium on Security and Privacy 2021" we published a new paper on PDF security: "Breaking the Specification: PDF Certification".

We present two novel attacks on certified documents: Sneaky Signature and Evil Annotation Attack. We also demonstrate how an attacker can gain rights to execute arbitrary JavaScript code in Adobe Acrobat.

More information can be found on and in our blogpost "Attacks on PDF Certification"

PDF In­se­cu­ri­ty at NDSS 2021

04.03.2021 - Vladislav Mladenov

Recently, we have pu­blis­hed two pa­pers on the "NDSS Symposium 2021".

Our first paper is "Pro­ces­sing Dan­ge­rous Paths - On Se­cu­ri­ty and Pri­va­cy of the Por­ta­ble Do­cu­ment For­mat" and deals with the security issues in PDF files. In the paper, we answer the question "What could go wrong if you open a PDF file?".

Our se­cond paper "Shadow At­tacks: Hiding and Re­pla­cing Con­tent in Si­gned PDFs" presents novel attacks on PDF signatures. The attacks allow the manipulation of digitally signed PDF documents without causing any warning by opening the file.

More in­for­ma­ti­on can be found on "pdf-in­se­cu­ri­ty.​org", in our blog­posts ("Blogpost: PDF Dangerous Paths", "Blogpost: PDF Shadow Attacks"), and videos ("Youtube: PDF Dangerous Paths", "Youtube: PDF Shadow Attacks").

Raccoon Attack: A new attack on TLS

14.09.2020 - Robert Merget

In Kooperation mit der Universität Paderborn, der Tel Aviv University und dem BSI haben NDS Wissenschaftler eine neue Schwachstelle im TLS Standard entdeckt. Bei der Schwachstelle, welche die Forscher "Raccoon" getauft haben, handelt es sich um eine Timing Schwachstellen in der Spezifikation von TLS. Mittels neuer Techniken können unter gewissen Umständen TLS-DH(E) Verbindungen entschlüsselt werden. Mehr Informationen finden sie auf


T0RTT at PETS 2020

30.03.2020 - Sebastian Lauer

In cooperation with scientists from the Universities of Paderborn and Wuppertal we have published the paper "T0RTT: Non-Interactive Immediate Forward-Secure Single-Pass Circuit Construction" at the 20th Privacy Enhancing Technologies Symposium.

Our paper deals with the question whether it is possible to speed up the circuit construction in Tor without sacrificing security properties such as forward security.

More infos can be found "here"

zum Nachrichtenarchiv