Skip to main content

Showing 1–3 of 3 results for author: Güldenring, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07787  [pdf, other

    cs.CR cs.HC

    Protecting Onion Service Users Against Phishing

    Authors: Benjamin Güldenring, Volker Roth

    Abstract: Phishing websites are a common phenomenon among Tor onion services, and phishers exploit that it is tremendously difficult to distinguish phishing from authentic onion domain names. Operators of onion services devised several strategies to protect their users against phishing. But as we show in this work, none protect users against phishing without producing traces about visited services - somethi… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

    Comments: 17 pages, 3 figures

    ACM Class: D.4.6; K.6.5; E.3; E.4

  2. arXiv:1801.00933  [pdf, other

    cs.CR

    New Directions for Trust in the Certificate Authority Ecosystem

    Authors: Jan-Ole Malchow, Benjamin Güldenring, Volker Roth

    Abstract: Many of the benefits we derive from the Internet require trust in the authenticity of HTTPS connections. Unfortunately, the public key certification ecosystem that underwrites this trust has failed us on numerous occasions. Towards an exploration of the root causes we present an update to the common knowledge about the Certificate Authority (CA) ecosystem. Based on our findings the certificate eco… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.

  3. arXiv:1301.6263  [pdf, other

    cs.CR

    A Secure Submission System for Online Whistleblowing Platforms

    Authors: Volker Roth, Benjamin Güldenring, Eleanor Rieffel, Sven Dietrich, Lars Ries

    Abstract: Whistleblower laws protect individuals who inform the public or an authority about governmental or corporate misconduct. Despite these laws, whistleblowers frequently risk reprisals and sites such as WikiLeaks emerged to provide a level of anonymity to these individuals. However, as countries increase their level of network surveillance and Internet protocol data retention, the mere act of using a… ▽ More

    Submitted 26 January, 2013; originally announced January 2013.

    Comments: An abridged version has been accepted for publication in the proceedings of Financial Cryptography and Data Security 2013