TLS 1.3 in practice: How TLS 1.3 contributes to the internet

H Lee, D Kim, Y Kwon - Proceedings of the Web Conference 2021, 2021‏ - dl.acm.org
Transport Layer Security (TLS) has become the norm for secure communication over the
Internet. In August 2018, TLS 1.3, the latest version of TLS, was approved, providing …

Certifiably vulnerable: Using certificate transparency logs for target reconnaissance

S Pletinckx, TD Nguyen, T Fiebig… - 2023 IEEE 8th …, 2023‏ - ieeexplore.ieee.org
The Web PKI ecosystem provides an underlying layer of security to many Internet protocols
used today. By relying on Certificate Authorities (CAs), communication can be authenticated …

SoK: log based transparency enhancing technologies

A Hicks - arxiv preprint arxiv:2305.01378, 2023‏ - arxiv.org
This paper systematizes log based Transparency Enhancing Technologies. Based on work
on transparency from multiple disciplines we outline the purpose, usefulness, and pitfalls of …

Uninvited guests: Analyzing the identity and behavior of certificate transparency bots

B Kondracki, J So, N Nikiforakis - 31st USENIX Security Symposium …, 2022‏ - usenix.org
Since its creation, Certificate Transparency (CT) has served as a vital component of the
secure web. However, with the increase in TLS adoption, CT has essentially become a …

[HTML][HTML] What's in a Name? Exploring {CA} Certificate Control

Z Ma, J Mason, S Patel, M Antonakakis… - 30th USENIX Security …, 2021‏ - s.usenix.org
USENIX Security '21 Technical Sessions | USENIX Sign In Conferences Attend Registration
Information Student Grant Application Diversity Grant Application Grants for Black Computer …

Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology

K Kumagai, S Kakei, Y Shiraishi… - Security and …, 2023‏ - Wiley Online Library
With the development of cloud services and the Internet of Things, the integration of
heterogeneous systems is becoming increasingly complex. Identity management is …

Polict: Flexible policy in certificate transparency enabling lightweight self-monitor

A Sun, B Li, H Wan, Q Wang - International Conference on Applied …, 2021‏ - Springer
Certificate Transparency (CT) is proposed to detect maliciously or mistakenly issued
certificates by recording all certificates in publicly-visible logs. CT assumes that any …

[PDF][PDF] Comparative analysis of subdomain enumeration tools and static code analysis

GJ Kathrine, RT Baby, V Ebenzer - ISSN (Online), 2020‏ - researchgate.net
Reconnaissance or footprinting is the technique used for gathering information about
computer systems and the entities they belong to. To exploit any system, a hacker might use …

This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data

R Sommese, R van Rijswijk-Deij, M Jonker - ACM SIGCOMM Computer …, 2024‏ - dl.acm.org
Domain lists are a key ingredient for representative censuses of the Web. Unfortunately,
such censuses typically lack a view on domains under country-code top-level domains …

Propagating Threat Scores With a TLS Ecosystem Graph Model Derived by Active Measurements

M Sosnowski, P Sattler, J Zirngibl… - 2024 8th Network …, 2024‏ - ieeexplore.ieee.org
The Internet is shaped by independent actors and heterogeneous deployments. With the
wide adoption of Transport Layer Security (TLS), a whole ecosystem of intertwined entities …