A survey on X. 509 public-key infrastructure, certificate revocation, and their modern implementation on blockchain and ledger technologies

S Khan, F Luo, Z Zhang, F Ullah, F Amin… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Cyber-attacks are becoming more common against Internet users due to the increasing
dependency on online communication in their daily lives. X. 509 Public-Key Infrastructure …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

IKP: Turning a PKI around with decentralized automated incentives

S Matsumoto, RM Reischuk - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Despite a great deal of work to improve the TLS PKI, CA misbehavior continues to occur,
resulting in unauthorized certificates that can be used to mount man-in-the-middle attacks …

An end-to-end measurement of certificate revocation in the web's PKI

Y Liu, W Tome, L Zhang, D Choffnes, D Levin… - Proceedings of the …, 2015 - dl.acm.org
Critical to the security of any public key infrastructure (PKI) is the ability to revoke previously
issued certificates. While the overall SSL ecosystem is well-studied, the frequency with …

IoTLS: understanding TLS usage in consumer IoT devices

MT Paracha, DJ Dubois, N Vallina-Rodriguez… - Proceedings of the 21st …, 2021 - dl.acm.org
Consumer IoT devices are becoming increasingly popular, with most leveraging TLS to
provide connection security. In this work, we study a large number of TLS-enabled consumer …

CRLite: A scalable system for pushing all TLS revocations to all browsers

J Larisch, D Choffnes, D Levin… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Currently, no major browser fully checks for TLS/SSL certificate revocations. This is largely
due to the fact that the deployed mechanisms for disseminating revocations (CRLs, OCSP …

Measurement and analysis of private key sharing in the https ecosystem

F Cangialosi, T Chung, D Choffnes, D Levin… - Proceedings of the …, 2016 - dl.acm.org
The semantics of online authentication in the web are rather straightforward: if Alice has a
certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of …

Measuring and applying invalid SSL certificates: The silent majority

T Chung, Y Liu, D Choffnes, D Levin… - Proceedings of the …, 2016 - dl.acm.org
SSL and TLS are used to secure the most commonly used Internet protocols. As a result, the
ecosystem of SSL certificates has been thoroughly studied, leading to a broad …

Certificate transparency in the wild: Exploring the reliability of monitors

B Li, J Lin, F Li, Q Wang, Q Li, J **g… - Proceedings of the 2019 …, 2019 - dl.acm.org
To detect fraudulent TLS server certificates and improve the accountability of certification
authorities (CAs), certificate transparency (CT) is proposed to record certificates in publicly …

To Pin or Not to {Pin—Hel**} App Developers Bullet Proof Their {TLS} Connections

M Oltrogge, Y Acar, S Dechand, M Smith… - 24th USENIX Security …, 2015 - usenix.org
For increased security during TLS certificate validation, a common recommendation is to use
a variation of pinning. Especially non-browser software developers are encouraged to limit …