The DNS as National Critical Infrastructure in an Era of Geopolitical Tensions

Abstract: The current geopolitical situation is characterized by growing dependence on digital infrastructures and increasing international tensions. For Switzerland, the Domain Name System (DNS) represents a crucial component in ensuring digital sovereignty and the protection of national interests. As a neutral state, Switzerland is particularly committed to maintaining its digital infrastructure in an independent, resilient,

Towards a New Generation of Cryptographic Software

Abstract: Cryptographic software is currently facing two major challenges. First, upgrading our cryptographic infrastructure to post-quantum primitives is probably the largest and most demanding cryptographic migration effort ever. New software needs to be written, optimized for different platforms, extensively tested and audited, and eventually integrated into protocols and systems. Second, it becomes increasingly clear that

Did Security Notifications Reach the Owners of IoT Devices?

Abstract: We have been working to discover IoT devices with security risks and to deliver security notifications to their owners. Our activities include discovering remote management devices used in critical infrastructure and notifying their operators; investigating IoT devices deployed within university networks and issuing notifications to administrators; and offering a security diagnostic service for consumer

Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head

Abstract: We propose efficient, post-quantum threshold ring signatures constructed from one-wayness of AES encryption and the VOLE-in-the-Head zero-knowledge proof system. Our scheme scales efficiently to large rings and extends the ring signatures paradigm. We define and construct key-binding deterministic tags for signature linkability, that also enable succinct aggregation with approximate lower bound arguments of knowledge;

GhostRace: Exploiting and Mitigating Speculative Race Conditions

Abstract: Race conditions arise when multiple threads attempt to access a shared resource without proper synchronization, often leading to vulnerabilities such as concurrent use-after-free. To mitigate their occurrence, operating systems rely on synchronization primitives such as mutexes, spinlocks, etc. In this paper, we present GhostRace, the first security analysis of these primitives on speculatively executed