2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.21
|View full text |Cite
|
Sign up to set email alerts
|

How Secure and Quick is QUIC? Provable Security and Performance Analyses

Abstract: QUIC is a secure transport protocol developed by Google and implemented in Chrome in 2013, currently representing one of the most promising solutions to decreasing latency while intending to provide security properties similar with TLS. In this work we shed some light on QUIC's strengths and weaknesses in terms of its provable security and performance guarantees in the presence of attackers. We first introduce a security model for analyzing performance-driven protocols like QUIC and prove that QUIC satisfies o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 87 publications
(69 citation statements)
references
References 31 publications
(54 reference statements)
0
68
0
1
Order By: Relevance
“…QUIC Security. A first security analysis QUIC's key exchange is presented in [7], followed by a later analysis of the complete protocol [12]. These works on the security analysis are complemented by presenting an attack vector in which the server config can be computed offline to impersonate the server [8].…”
Section: Related Workmentioning
confidence: 99%
“…QUIC Security. A first security analysis QUIC's key exchange is presented in [7], followed by a later analysis of the complete protocol [12]. These works on the security analysis are complemented by presenting an attack vector in which the server config can be computed offline to impersonate the server [8].…”
Section: Related Workmentioning
confidence: 99%
“…Web browsing includes 4 key actors, namely the enduser, the web browser, the network and the remote web server. While some research work [20,21] describes how to qualify user-experience better, other studies investigate the impact of different Internet protocols on web browsing quality [22,23,24,25,26,27]. Regarding the network, particular interest is given to the upload or download link when investigating bottlenecks [28,29,30] and Naseer and al.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The unknown key share attack described above applies to both QUIC and OPTLS, but remained undiscovered despite several security analyses of these protocols [45,62,58], because these works did not consider client authentication, and hence did not formulate an authentication goal that exposed the flaw. We informed the authors of QUIC and they acknowledged our attack.…”
Section: -Rtt With Semi-static Diffie-hellmanmentioning
confidence: 99%