A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
[HTML][HTML] A systematic review of cybersecurity assessment methods for HTTPS
Cybersecurity assessments are critical for ensuring that security measures in organizational
infrastructures, systems, and applications meet necessary requirements. Given the …
infrastructures, systems, and applications meet necessary requirements. Given the …
Let's Encrypt: an automated certificate authority to encrypt the entire web
Let's Encrypt is a free, open, and automated HTTPS certificate authority (CA) created to
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
advance HTTPS adoption to the entire Web. Since its launch in late 2015, Let's Encrypt has …
A long way to the top: Significance, structure, and stability of internet top lists
A broad range of research areas including Internet measurement, privacy, and network
security rely on lists of target domains to be analysed; researchers make use of target lists …
security rely on lists of target domains to be analysed; researchers make use of target lists …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
Clusters in the expanse: Understanding and unbiasing IPv6 hitlists
Network measurements are an important tool in understanding the Internet. Due to the
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In …
On landing and internal web pages: The strange case of jekyll and hyde in web performance measurement
There is a rich body of literature on measuring and optimizing nearly every aspect of the
web, including characterizing the structure and content of web pages, devising new …
web, including characterizing the structure and content of web pages, devising new …
Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization
Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
protocol. It was standardized in August 2018 after a four year-long, unprecedented design …
{LZR}: Identifying unexpected internet services
Internet-wide scanning is a commonly used research technique that has helped uncover
real-world attacks, find cryptographic weaknesses, and understand both operator and …
real-world attacks, find cryptographic weaknesses, and understand both operator and …
It's over 9000: analyzing early QUIC deployments with the standardization on the horizon
After nearly five years and 34 draft versions, standardization of the new connection oriented
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …
transport protocol QUIC was finalized in May 2021. Designed as a fundamental network …