The Research archive provides access to all Research articles published in past issues of Communications of the ACM.
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities.
…One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight. A truism of the security community is that "complexity is the enemy…
We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.