A-Amyan

Results 11 issues of A-Amyan

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _EncryptionManager.java_ at lines {911, 923}, which can lead to an attack (e.g., Codebook attack...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in ClientFactory.java at line {464}, which can lead to an attack (e.g., Collisions and precomputation...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in symmetricAlgTest.java at line {72}, which can lead to an attack (e.g., Exhaustive key search...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in symmetricEncryption.java at lines {35, 49}, which can lead to an attack (e.g., Codebook attack...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _symmetricEncryption.java_ at lines {36, 50}, which can lead to an attack (e.g., Trivial brute-forcing...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in symmetricEncryption.java at lines {40, 54}, which can lead to an attack (e.g., Semantic security...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _Utils.java_, Cipher at lines {986, 1002}, which can lead to an attack (e.g., Codebook...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _CryptixAESEngine.java_ at line {52}, which can lead to an attack (e.g., Key extraction via...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _CryptixAESEngine.java_ at line {53}, which can lead to an attack (e.g., Semantic security is...

We are a German research group investigating the misuse of cryptographic APIs. We found vulnerabilities in _JwtTokenTest.java_ at line {28}, which can lead to an attack (e.g., Trivial brute-forcing or...