A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Kee** authorities" honest or bust" with decentralized witness cosigning
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …
update services--represent high-value targets for hackers, criminals, and spy agencies …
IKP: Turning a PKI around with decentralized automated incentives
S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …
[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
more vulnerable to its security flaws. Despite substantial efforts to address many of these …
Post-quantum authentication in TLS 1.3: a performance study
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
Certchain: Public and efficient certificate audit based on blockchain for tls connections
In recent years, real-world attacks against PKI take place frequently. For example, malicious
domains' certificates issued by compromised CAs are widespread, and revoked certificates …
domains' certificates issued by compromised CAs are widespread, and revoked certificates …
CertLedger: A new PKI model with certificate transparency based on blockchain
In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs'
absolute responsibility for providing trustworthiness caused major security and privacy …
absolute responsibility for providing trustworthiness caused major security and privacy …
Blockchain-based certificate transparency and revocation transparency
Traditional X. 509 public key infrastructures (PKIs) depend on trusted certification authorities
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …
(CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure …
Nethammer: Inducing rowhammer faults through network requests
In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …