scispace - formally typeset
Search or ask a question

Showing papers by "Benjamin Richard published in 2017"


Proceedings ArticleDOI
24 Aug 2017
TL;DR: This paper investigates the security guarantees provided by Keyless SSL, a CDN architecture currently deployed by CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied TLS connection and presents 3(S)ACCEsecurity, a generalization of the 2-party ACCE security definition that has been used in several previous proofs for TLS.
Abstract: The Transport Layer Security (TLS) protocol is designed to allow two parties, a client and a server, to communicate securely over an insecure network. However, when TLS connections are proxied through an intermediate middlebox, like a Content Delivery Network (CDN), the standard endto- end security guarantees of the protocol no longer apply. In this paper, we investigate the security guarantees provided by Keyless SSL, a CDN architecture currently deployed by CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied TLS connection. We demonstrate new attacks that show that Keyless SSL does not meet its intended security goals. These attacks have been reported to CloudFlare and we are in the process of discussing fixes. We argue that proxied TLS handshakes require a new, stronger, 3-party security definition. We present 3(S)ACCEsecurity, a generalization of the 2-party ACCE security definition that has been used in several previous proofs for TLS. We modify Keyless SSL and prove that our modifications guarantee 3(S)ACCE-security, assuming ACCE-security for the individual TLS 1.2 connections. We also propose a new design for Keyless TLS 1.3 and prove that it achieves 3(S)ACCEsecurity, assuming that the TLS 1.3 handshake implements an authenticated 2-party key exchange. Notably, we show that secure proxying in Keyless TLS 1.3 is computationally lighter and requires simpler assumptions on the certificate infrastructure than our proposed fix for Keyless SSL. Our results indicate that proxied TLS architectures, as currently used by a number of CDNs, may be vulnerable to subtle attacks and deserve close attention.

30 citations


Journal ArticleDOI
TL;DR: In this paper, a modified crack-tracking algorithm, considering the evolution of the root for the identification of the crack path, is proposed, and the numerical assessment of the proposed tracking strategy is reported by means of benchmark tests at structural level.

23 citations


Journal ArticleDOI
TL;DR: The SINAPS@ project as mentioned in this paper aims at exploring uncertainties associated to databases, physical processes and methods used at each stage of seismic hazard, site effects, soil and structure interaction, structural and nuclear components vulnerability assessments, in a safety approach: the main objective is ultimately to identify the sources of potential seismic margins resulting from assumptions or when selecting the seismic design level or the design strategy.

17 citations


Journal ArticleDOI
TL;DR: In this article, it has been shown that a kinematic enhancement of the displacement field allows constructing a discrete model (expressed in terms of traction vector-displacement jump) from any continuous model, where the continuous model is formulated within the framework of either isotropic continuum damage or plasticity theories.

12 citations


Journal ArticleDOI
TL;DR: In this paper, a micromechanical-based anisotropic damage constitutive model is derived to reproduce the induced anisotropy appearing in quasi-brittle materials when cracking and to assess the numerical robustness of the time integration scheme.

10 citations