Gregor Samsa: Exploiting Java’s XML Signature Verification
XML Signatures are a typical example of a security protocol invented in the early 2000’s. They suffer from high complexity, a large attack surface and a wealth of configurable features that can weaken or break its security guarantees in surprising Read More …