SoK: Secure Messaging

@article{Unger2015SoKSM,
  title={SoK: Secure Messaging},
  author={Nik Unger and Sergej Dechand and Joseph Bonneau and Sascha Fahl and H. Perl and I. Goldberg and M. Smith},
  journal={2015 IEEE Symposium on Security and Privacy},
  year={2015},
  pages={232-249}
}
Motivated by recent revelations of widespread state surveillance of personal communication, many solutions now claim to offer secure and private messaging. This includes both a large number of new projects and many widely adopted tools that have added security features. The intense pressure in the past two years to deliver solutions quickly has resulted in varying threat models, incomplete objectives, dubious security claims, and a lack of broad perspective on the existing cryptographic… Expand
136 Citations
Poster: Can Johnny Authenticate?
  • PDF
Deniable Key Exchanges for Secure Messaging
  • 23
  • PDF
SoK: Securing Email---A Stakeholder-Based Analysis.
  • PDF
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (authors' version)
  • 1
  • Highly Influenced
  • PDF
A Comparison of Secure Messaging Protocols and Implementations
  • 3
  • Highly Influenced
Practical Traffic Analysis Attacks on Secure Messaging Applications
  • 5
  • PDF
Obstacles to the Adoption of Secure Communication Tools
  • 79
  • PDF
Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant Messaging
  • Highly Influenced
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 182 REFERENCES
How Secure is TextSecure?
  • 59
  • PDF
SafeSlinger: easy-to-use and secure public-key exchange
  • 51
  • PDF
Off-the-record communication, or, why not to use PGP
  • 280
  • PDF
Secure Group Instant Messaging Using Cryptographic Primitives
  • 3
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
  • 184
  • PDF
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication
  • 20
  • PDF
A user study of off-the-record messaging
  • 31
  • PDF
Multi-party off-the-record messaging
  • 41
  • PDF
Proactively Accountable Anonymous Messaging in Verdict
  • 68
  • PDF
...
1
2
3
4
5
...