Skip to main content

Showing 1–3 of 3 results for author: Judmayer, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.07323  [pdf, ps, other

    cs.CR cs.NI

    Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism

    Authors: Gabriel K. Gegenhuber, Philipp É. Frenzel, Maximilian Günther, Aljosha Judmayer

    Abstract: WhatsApp, the world's largest messaging application, uses a version of the Signal protocol to provide end-to-end encryption (E2EE) with strong security guarantees, including Perfect Forward Secrecy (PFS). To ensure PFS right from the start of a new conversation -- even when the recipient is offline -- a stash of ephemeral (one-time) prekeys must be stored on a server. While the critical role of th… ▽ More

    Submitted 16 June, 2025; v1 submitted 9 April, 2025; originally announced April 2025.

    Comments: USENIX WOOT Conference 2025

  2. arXiv:2411.11194  [pdf

    cs.CR cs.NI

    Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers

    Authors: Gabriel K. Gegenhuber, Maximilian Günther, Markus Maier, Aljosha Judmayer, Florian Holzbauer, Philipp É. Frenzel, Johanna Ullrich

    Abstract: With over 3 billion users globally, mobile instant messaging apps have become indispensable for both personal and professional communication. Besides plain messaging, many services implement additional features such as delivery and read receipts informing a user when a message has successfully reached its target. This paper highlights that delivery receipts can pose significant privacy risks to us… ▽ More

    Submitted 1 July, 2025; v1 submitted 17 November, 2024; originally announced November 2024.

  3. arXiv:1905.05999  [pdf, other

    cs.CR

    A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares

    Authors: Matteo Romiti, Aljosha Judmayer, Alexei Zamyatin, Bernhard Haslhofer

    Abstract: Miners play a key role in cryptocurrencies such as Bitcoin: they invest substantial computational resources in processing transactions and minting new currency units. It is well known that an attacker controlling more than half of the network's mining power could manipulate the state of the system at will. While the influence of large mining pools appears evenly split, the actual distribution of m… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Conference paper https://weis2019.econinfosec.org