Skip navigation

Duo Tech Talk: Were It So Easy: TLS in the Real World

Originally aired: Thursday, July 09, 2015

  • Learn about security issues and vulnerabilities of TLS, the cryptographic protocol
  • Hear about the Logjam attack, a TLS vulnerability
  • Find out how ZMap, an open-source network scanner, led to its discovery
 

University of Michigan graduate David Adrian and Ph.D. candidate Zakir Durumeric discuss the security problems with TLS, the most commonly deployed cryptographic protocol. They present research on the Logjam attack, a TLS vulnerability, and how ZMap lead to its discovery.

Presenter Info
David Adrian, Graduate Student, University of Michigan

David Adrian is a former Duo intern who got lost on the way to work one day, and ended up a Computer Science Engineering graduate student at the University of Michigan. David helps maintain ZMap, and created ZGrab, the younger brother of ZMap used for Internet-wide application-level scanning. If you run an HTTPS server, David has probably downloaded your certificate.

Zakir Durumeric, Ph.D. Candidate, University of Michigan

Zakir Durumeric is a Ph.D. Candidate in Computer Science and Engineering at the University of Michigan and the 2014 Google Ph.D. Fellow in Computer Security. His research focuses on network security. Zakir is widely known for creating ZMap, an Internet-wide network scanner capable of scanning the entire public IPv4 address space in minutes. Most recently, Zakir was involved in uncovering the Logjam attack and widespread failures in the real-world deployment of Diffie-Hellman. He is the lead maintainer of the ZMap open source project and the Internet-Wide Scan Data Repository. He received his M.S. from the University of Michigan in 2013 and B.S. in computer science and mathematics from the University of Iowa in 2011.