N
Nick Sullivan
Researcher at Apple Inc.
Publications - 59
Citations - 2200
Nick Sullivan is an academic researcher from Apple Inc.. The author has contributed to research in topics: Key (cryptography) & Public-key cryptography. The author has an hindex of 15, co-authored 56 publications receiving 1639 citations. Previous affiliations of Nick Sullivan include Queensland University of Technology & University of Michigan.
Papers
More filters
Proceedings Article
Understanding the mirai botnet
Manos Antonakakis,Tim April,Michael Bailey,Matthew Bernhard,Elie Bursztein,Jaime Cochran,Zakir Durumeric,J. Alex Halderman,Luca Invernizzi,Michalis Kallitsis,Deepak Kumar,Chaz Lever,Zane Ma,Joshua Mason,D. Menscher,Chad Seaman,Nick Sullivan,Kurt Thomas,Yi Zhou +18 more
TL;DR: It is argued that Mirai may represent a sea change in the evolutionary development of botnets--the simplicity through which devices were infected and its precipitous growth, and that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets.
Proceedings ArticleDOI
The Security Impact of HTTPS Interception
Zakir Durumeric,Zane Ma,Drew Springall,Richard Barnes,Nick Sullivan,Elie Bursztein,Michael Bailey,J. Alex Halderman,Vern Paxson +8 more
TL;DR: This work introduces a novel technique for passively detecting HTTPS interception based on handshake characteristics, and assesses the prevalence and impact of HTTPS interception by applying heuristics to nearly eight billion connection handshakes.
Patent
Secure session capability using public-key cryptography without access to the private key
Sébastien Andreas Henry Pahl,Matthieu Phillippe François Tourne,Piotr Sikora,Ray Raymond Bejjani,Dane Orion Knecht,Matthew Browning Prince,John Graham-Cumming,Lee Hahn Holloway,Nick Sullivan,Albertus Strasheim +9 more
TL;DR: In this paper, a server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server, and the server transmits the encrypted premaster secret to another server for decryption.
Patent
Adaptive secondary authentication criteria based on account data
TL;DR: In this article, an authentication challenge system for secondary authentication for an account associated with an online store is described, which includes a question generation engine, which can derive a series of questions based upon activity associated with a user account of online store; a network interface can transport the series of one or more questions derived by the question generator to authenticate the user to the online store, and a confidence engine can determine a required confidence level for a successful authentication.
Journal ArticleDOI
Privacy Pass: Bypassing Internet Challenges Anonymously
TL;DR: This work provides a solution to prevent users from being exposed to a disproportionate amount of internet challenges such as CAPTCHAs, and detail a 1-RTT cryptographic protocol that allows users to receive a significant amount of anonymous tokens for each challenge solution that they provide.