A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
IKP: Turning a PKI around with decentralized automated incentives
S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …
An end-to-end measurement of certificate revocation in the web's PKI
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …
IoTLS: understanding TLS usage in consumer IoT devices
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …
provide connection security. In this work, we study a large number of TLS-enabled consumer …
CRLite: A scalable system for pushing all TLS revocations to all browsers
Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …
Measurement and analysis of private key sharing in the https ecosystem
The semantics of online authentication in the web are rather straightforward: if Alice has a
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …
Measuring and applying invalid SSL certificates: The silent majority
SSL and TLS are used to secure the most commonly used Internet protocols. As a result, the
ecosystem of SSL certificates has been thoroughly studied, leading to a broad …
ecosystem of SSL certificates has been thoroughly studied, leading to a broad …
Certificate transparency in the wild: Exploring the reliability of monitors
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …
To Pin or Not to {Pin—Hel**} App Developers Bullet Proof Their {TLS} Connections
For increased security during TLS certificate validation, a common recommendation is to use
a variation of pinning. Especially non-browser software developers are encouraged to limit …
a variation of pinning. Especially non-browser software developers are encouraged to limit …