{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T06:03:05Z","timestamp":1771480985061,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030808242","type":"print"},{"value":"9783030808259","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80825-9_5","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"88-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Help, My Signal has Bad Device!"],"prefix":"10.1007","author":[{"given":"Jan","family":"Wichelmann","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Berndt","sequence":"additional","affiliation":[]},{"given":"Claudius","family":"Pott","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Eisenbarth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"5_CR1","unstructured":"Barcode Scanner app on Google Play infects 10 million users with one update. https:\/\/blog.malwarebytes.com\/android\/2021\/02\/barcode-scanner-app-on-google-play-infects-10-million-users-with-one-update\/. Accessed 22 Feb 2021"},{"key":"5_CR2","unstructured":"Microsoft Teams. https:\/\/teams.microsoft.com. Accessed 22 Feb 2021"},{"key":"5_CR3","unstructured":"More Keys Than A Piano: Finding Secrets in Publicly Exposed Ebs Volumes. https:\/\/www.defcon.org\/html\/defcon-27\/dc-27-speakers.html#Morris. Accessed 22 Feb 2021"},{"key":"5_CR4","unstructured":"Slack. https:\/\/slack.com\/. Accessed 22 Feb 2021"},{"key":"5_CR5","unstructured":"The Messaging Layer Security (MLS) Protocol (11). https:\/\/tools.ietf.org\/id\/draft-ietf-mls-protocol-11.html. Accessed 22 Feb 2021"},{"key":"5_CR6","unstructured":"Webex Teams. https:\/\/teams.webex.com. Accessed 22 Feb 2021"},{"key":"5_CR7","unstructured":"Matrix. https:\/\/matrix.org\/. Accessed 16 Feb 2021"},{"key":"5_CR8","unstructured":"Council resolution on encryption. Council of the European Union, November 24 (2020). https:\/\/data.consilium.europa.eu\/doc\/document\/ST-13084-2020-REV-1\/en\/pdf. Accessed 22 Feb 2021"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-030-17653-2_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"J Alwen","year":"2019","unstructured":"Alwen, J., Coretti, S., Dodis, Y.: The double ratchet: security notions, proofs, and modularization for the signal protocol. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 129\u2013158. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_5"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bellare, M., Jaeger, J., Kane, D.: Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: Proceedings of the CCS. pp. 1431\u20131440. ACM (2015)","DOI":"10.1145\/2810103.2813681"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-662-44371-2_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"M Bellare","year":"2014","unstructured":"Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 1\u201319. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_1"},{"key":"5_CR12","unstructured":"Bergman, R., Fassihi, F.: Iranian hackers found way into encrypted apps, researchers say (2020). https:\/\/www.nytimes.com\/2020\/09\/18\/world\/middleeast\/iran-hacking-encryption.html. Accessed 13 Oct 2020"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-030-57878-7_9","volume-title":"Applied Cryptography and Network Security","author":"S Campion","year":"2020","unstructured":"Campion, S., Devigne, J., Duguey, C., Fouque, P.-A.: Multi-device for signal. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 2020. LNCS, vol. 12147, pp. 167\u2013187. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57878-7_9"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Cohn-Gordon, K., Cremers, C., Garratt, L., Millican, J., Milner, K.: On ends-to-ends encryption: asynchronous group messaging with strong security guarantees. In: CCS, pp. 1802\u20131819. ACM (2018)","DOI":"10.1145\/3243734.3243747"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: EuroS&P, pp. 451\u2013466. IEEE (2017)","DOI":"10.1109\/EuroSP.2017.27"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Cohn-Gordon, K., Cremers, C.J.F., Garratt, L.: On post-compromise security. In: CSF, pp. 164\u2013178. IEEE Computer Society (2016)","DOI":"10.1109\/CSF.2016.19"},{"key":"5_CR17","unstructured":"Cox, J.: How police secretly took over a global phone network for organized crime. Motherboard Tech by VICE, July 2 (2020). https:\/\/www.vice.com\/en\/article\/3aza95\/how-police-took-over-encrochat-hacked. Accessed 13 Oct 2020"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Cremers, C., Fairoze, J., Kiesl, B., Naska, A.: Clone detection in secure messaging: improving post-compromise security in practice. In: CCS, pp. 1481\u20131495. ACM (2020)","DOI":"10.1145\/3372297.3423354"},{"key":"5_CR19","unstructured":"Feiner, L.: Republican senators introduce bill that tech advocates have warned would weaken privacy. CNBC, June 24 (2020). https:\/\/www.cnbc.com\/2020\/06\/24\/gop-senators-introduce-bill-that-would-create-a-backdoor-for-encryption.html. Accessed 22 Feb 2021"},{"key":"5_CR20","first-page":"1","volume":"5869","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H., Eronen, P.: Hmac-based extract-and-expand key derivation function (HKDF). RFC 5869, 1\u201314 (2010)","journal-title":"RFC"},{"key":"5_CR21","first-page":"1","volume":"7748","author":"A Langley","year":"2016","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic curves for security. RFC 7748, 1\u201322 (2016)","journal-title":"RFC"},{"key":"5_CR22","unstructured":"Lund, J.: Technology Preview for secure value recovery. https:\/\/signal.org\/blog\/secure-value-recovery\/ (2019). Accessed 15 Feb 2021"},{"key":"5_CR23","unstructured":"Meyer, D.: Russia\u2019s online censorship machine is no longer running smoothly. FORTUNE, June 24 (2020). https:\/\/fortune.com\/2020\/06\/24\/russia-online-censorship-faltering-telegram-kasparov\/. Accessed 22 Feb 2021"},{"key":"5_CR24","unstructured":"Microsoft: Skype private conversation (2018). https:\/\/az705183.vo.msecnd.net\/onlinesupportmedia\/onlinesupport\/media\/skype\/documents\/skype-private-conversation-white-paper.pdf. Accessed 29 Sept 2020"},{"key":"5_CR25","unstructured":"Open Whisper Systems: Advanced cryptographic ratcheting. https:\/\/signal.org\/blog\/advanced-ratcheting\/. Accessed 16 Feb 2021"},{"key":"5_CR26","unstructured":"Open Whisper Systems: Signal Protocol Specifications. https:\/\/signal.org\/docs\/. Accessed 29 Sept 2020"},{"key":"5_CR27","unstructured":"Open Whisper Systems: The Double Ratchet Algorithm. https:\/\/signal.org\/docs\/specifications\/doubleratchet\/. Accessed 28 Sept 2020"},{"key":"5_CR28","unstructured":"Open Whisper Systems: The Sesame Algorithm: Session Management for Asynchronous Message Encryption. https:\/\/signal.org\/docs\/specifications\/sesame\/. Accessed 28 Sept 2020"},{"key":"5_CR29","unstructured":"Open Whisper Systems: The X3DH Key Agreement Protocol. https:\/\/signal.org\/docs\/specifications\/x3dh\/. Accessed 28 Sept 2020"},{"key":"5_CR30","unstructured":"Randall: Introducing Signal PINs. https:\/\/signal.org\/blog\/signal-pins\/ (2020). Accessed 15 Feb 2021"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: ACM Conference on Computer and Communications Security, pp. 98\u2013107. ACM (2002)","DOI":"10.1145\/586110.586125"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11761679_23","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"P Rogaway","year":"2006","unstructured":"Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373\u2013390. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_23"},{"key":"5_CR33","unstructured":"WhatsApp: Whatsapp encryption overview (2017). https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf. Accessed 28 Sept 2020"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80825-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T09:03:53Z","timestamp":1628154233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80825-9_5"}},"subtitle":["Breaking the Signal Messenger\u2019s Post-Compromise Security Through a Malicious Device"],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030808242","9783030808259"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80825-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dimva2021.campus.ciencias.ulisboa.pt\/cfp.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}