all InfoSec news
Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors. (arXiv:2211.13195v1 [cs.CR])
Nov. 24, 2022, 2:10 a.m. | Mihai Christodorescu, Maliheh Shirvanian, Shams Zawoad
cs.CR updates on arXiv.org arxiv.org
Application authentication is typically performed using some form of secret
credentials such as cryptographic keys, passwords, or API keys. Since clients
are responsible for securely storing and managing the keys, this approach is
vulnerable to attacks on clients. Similarly a centrally managed key store is
also susceptible to various attacks and if compromised, can leak credentials.
To resolve such issues, we propose an application authentication, where we rely
on unique and distinguishable application's behavior to lock the key during a …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
DevSecOps Engineer
@ SIXGEN | Remote
Senior DevSecOps Engineer
@ nou Systems, Inc. | Huntsville AL, Huntsville, AL, US
Security Engineer (f/m/d)
@ Enpal B.V. | Berlin, Germany