{DROWN}: Breaking {TLS} Using {SSLv2}

N Aviram, S Schinzel, J Somorovsky… - 25th USENIX Security …, 2016 - usenix.org
… We present DROWN, a novel cross-protocol attack on TLS that uses a server supporting
SSLv2 as an oracle to decrypt modern TLS connections. We introduce two versions of the …

Comparison of modern network attacks on TLS protocol

O Ivanov, V Ruzhentsev… - … Conference Problems of …, 2018 - ieeexplore.ieee.org
… new TLS version - TLS 1.3. Well-known network attacks (BEAST, CRIME, BREACH and
DROWN)… Finally, we compare reviewed attacks using own criteria that will help to understand the …

[PDF][PDF] ПРОБЛЕМЫ БЕЗОПАСНОСТИ ПРИ ИСПОЛЬЗОВАНИИ ПРОТОКОЛОВ SSL/TLS

ДА КУЗЬМИЦКИЙ, АЮ ЖМАКОВ - … , Смоленск, 17–19 мая 2016 г.,—Москва … - 2016.kzi.su
DROWN, если он допускает подключение к нему с использованием протокола SSLv2.
Это … Также сервер уязвим к атаке DROWN, если его личный ключ используется какимлибо …

A study of the TLS ecosystem

O Levillain - 2016 - theses.hal.science
… the SSL/TLS ecosystem at large using IPv4 HTTPS scans, … Beyond these observations, we
focus on two key aspects of TLS … historical section on SSLv2 and the final section on TLS 1.3, …

Empirical analysis of SSL/TLS weaknesses in real websites: Who cares?

S Oh, E Kim, H Kim - … : 17th International Workshop, WISA 2016, Jeju …, 2017 - Springer
… The DROWN attack uses the vulnerability of SSLv2. The latest clients and servers use TLS
… still provide compatibility with SSLv2. It is even possible that the servers, which do not allow …

A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment

L Alqaydi, CY Yeun, E Damiani - Applied Computing and Information …, 2019 - Springer
DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols
and cipher-suites in SSL/TLS … after SSLv2 in order to fix structural security flaws in SSLv2

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
… in parallel with TLS 1.2? (2) Can we mechanically verify the computational security of TLS
1.3 under … (3) How can we extend the guarantees of the TLS 1.3 protocol to the details of its …

TLS-Monitor: An Intrusion Detection-based Monitoring Tool for countering TLS Attacks

G Petraglia - 2023 - webthesis.biblio.polito.it
TLS 1.0. This protocol changed other 2 versions TLS 1.1 in 2006 and TLS 1.2 in 2008 before
becoming TLS … The TLS attacks discovered over the years harm the protocol in a specific …

[PDF][PDF] TryTLS: testing TLS libraries

A Klasila - 2017 - oulurepo.oulu.fi
… to decrypt intercepted TLS connections by making specially crafted connections to an SSLv2
server that uses the same private key. Many of the servers vulnerable to DROWN are also …

Проблеми використання SSL/TLS

Т Бабенко, С Толюпа, В Гречко - Захист інформації, 2017 - irbis-nbuv.gov.ua
… недавні уразливості даного протоколу (SWEET32, DROWN, ROBOT). Результатом …
TLS-з'єднань жертви і відправляти спеціальним чином сформовані пакети на сервер з SSLv2