Skip to main content

Showing 1–2 of 2 results for author: van Hove, K

.
  1. arXiv:2312.07284  [pdf, other

    cs.NI

    Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue

    Authors: Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij

    Abstract: It is a public secret that doing email securely is fraught with challenges. We found a vulnerability present at many email providers, allowing us to spoof email on behalf of many organisations. As email vulnerabilities are ten a penny, instead of focusing on yet another email vulnerability we ask a different question: how do organisations react to the disclosure of such a security issue in the wil… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 15 pages, 15 figures

  2. arXiv:2203.00993  [pdf, other

    cs.CR cs.NI

    Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

    Authors: Koen van Hove, Jeroen van der Ham, Roland van Rijswijk-Deij

    Abstract: The Resource Public Key Infrastructure (RPKI) aims to secure internet routing by creating an infrastructure where resource holders can make attestations about their resources. RPKI Certificate Authorities issue these attestations and publish them at Publication Points. Relying Party software retrieves and processes the RPKI-related data from all publication points, validates the data and makes it… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

    Comments: 17 pages