Nimrod Aviram (@nimrodaviram) 's Twitter Profile
Nimrod Aviram

@nimrodaviram

TAU PhD student. Recently worked on DROWN: drownattack.com

ID: 3030979488

calendar_today19-02-2015 18:08:31

218 Tweet

233 Followers

398 Following

Nimrod Aviram (@nimrodaviram) 's Twitter Profile Photo

Our community still has a lot of work to do. (I also think we're slowly approaching "done" with TLS, and should consider switching the focus to email and MLS).

Our community still has a lot of work to do.
(I also think we're slowly approaching "done" with TLS, and should consider switching the focus to email and MLS).
Eyal Ronen (@eyalr0) 's Twitter Profile Photo

"The 9 Lives of Bleichenbacher's CAT:New Cache ATtacks on TLS Implementations ", with Robert Gillham, Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom is now available at cat.eyalro.net

"The 9 Lives of Bleichenbacher's CAT:New Cache ATtacks on TLS Implementations ", with Robert Gillham, Daniel Genkin, Adi Shamir, <a href="/cryptodavidw/">David Wong</a> and <a href="/yuvalyarom/">Yuval Yarom</a> is now available at cat.eyalro.net
Nimrod Aviram (@nimrodaviram) 's Twitter Profile Photo

Reporting the OpenSSL bug would not be possible without Colm MacCárthaigh and his colleagues. We just reported an invalid behavior, they performed all the hard analyses. Unfortunately, not all security teams are so collaborative...

Craig  Young (@craigtweets) 's Twitter Profile Photo

My TLS CBC padding oracle scanner source code is now available: github.com/Tripwire/padch… (Dockerfile included) Full details about Zombie POODLE and GOLDENDOODLE are now on z3n hunter blog: tripwire.com/state-of-secur… Thank you for everyone who joined me at #BHASIA

My TLS CBC padding oracle scanner source code is now available: github.com/Tripwire/padch… (Dockerfile included)

Full details about Zombie POODLE and GOLDENDOODLE are now on <a href="/TripwireInc/">z3n hunter</a> blog: tripwire.com/state-of-secur…

Thank you for everyone who joined me at #BHASIA
Craig  Young (@craigtweets) 's Twitter Profile Photo

padcheck binary release now on z3n hunter GitHub github.com/Tripwire/padch… This is the version used to collect the final GOLDENDOODLE & Zombie POODLE figures presented at Black Hat #BHASIA Please open issues for bug reports :)

juraj somorovsky (@jurajsomorovsky) 's Twitter Profile Photo

We just put our paper on Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities online: github.com/RUB-NDS/TLS-Pa… // @ic0nz1, Nimrod Aviram I will present our results in the next session of the Crypto Summer School: summerschool-croatia.cs.ru.nl/2019/program.s…

Sebastian Schinzel @seecurity@infosec.exchange (@seecurity) 's Twitter Profile Photo

New Paper: “Practical Decryption exFiltration: Breaking PDF Encryption“ describing new attacks that uncover the plaintext of encrypted PDFs. To be presented at ACM CCS 2025 and joint work with Jens Müller Fabian @[email protected] vladislav mladenov Christian Jörg Schwenk. #PDFex 1/n

New Paper: “Practical Decryption exFiltration: Breaking PDF Encryption“ describing new attacks that uncover the plaintext of encrypted PDFs. To be presented at <a href="/acm_ccs/">ACM CCS 2025</a> and joint work with <a href="/jensvoid/">Jens Müller</a> <a href="/Murgi/">Fabian @murgi@infosec.exchange</a> <a href="/v_mladenov/">vladislav mladenov</a> <a href="/CheariX/">Christian</a> <a href="/JoergSchwenk/">Jörg Schwenk</a>. #PDFex 1/n
jimeharrisjr.bsky.social (@jimeharrisjr) 's Twitter Profile Photo

thaddeus e. grugq Matthew Green is on BlueSky Child exploitation is "icky" and men in suits don't feel comfortable discussing it. They don't like planning ops against it. Everybody wants to "smash the perverts," but doing it correctly would require actual time investment in a very dark world.

juraj somorovsky (@jurajsomorovsky) 's Twitter Profile Photo

After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: hackmanit.de/en/blog-en/82-… (CVE-2019-3465) // cc Hackmanit

After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: hackmanit.de/en/blog-en/82-… (CVE-2019-3465) // cc <a href="/hackmanit/">Hackmanit</a>
juraj somorovsky (@jurajsomorovsky) 's Twitter Profile Photo

Anybody aware of a TLS server using extended random extension? (some RSA bsafe server/Canon printer?) ...we need to do some compatibility tests for our TLS-Attacker, promise not to cause any harm :)

Kai Gellert (@kaigellert) 's Twitter Profile Photo

Our paper "Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC" has been accepted to CANS 2020. We analyze how costly the deployment of fully foward-secure 0-RTT would be in practice. The paper can be found at eprint.iacr.org/2020/824