메뉴 건너뛰기




Volumn , Issue , 2013, Pages 59-69

Here's my cert, so trust me, maybe? Understanding TLS errors on the web

Author keywords

TLS; Usability; Warnings

Indexed keywords

HIGH-RISK SITUATIONS; LARGE-SCALE MEASUREMENT; MEASUREMENT STUDY; MISCONFIGURATIONS; NETWORK MONITORS; TLS; USABILITY; WARNINGS;

EID: 84890107028     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (70)

References (49)
  • 4
    • 84855681364 scopus 로고    scopus 로고
    • The security cost of cheap user interaction
    • Böhme, R., and Grossklags, J. The Security Cost of Cheap User Interaction. In Proc. of NSPW 2011
    • (2011) Proc. of NSPW
    • Böhme, R.1    Grossklags, J.2
  • 6
    • 84888009741 scopus 로고    scopus 로고
    • Convergence. http://www.convergence.io.
    • Convergence
  • 7
    • 51049122345 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list profile
    • May
    • Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and Polk, W. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile. RFC 5280, May 2008.
    • (2008) RFC 5280
    • Cooper, D.1    Santesson, S.2    Farrell, S.3    Boeyen, S.4    Housley, R.5    Polk, W.6
  • 10
    • 84955468238 scopus 로고    scopus 로고
    • Transport layer security (TLS) extensions: Extension definitions
    • Jan.
    • Eastlake, D. Transport Layer Security (TLS) Extensions: Extension Definitions. RFC 6066 (Proposed Standard), Jan. 2011.
    • (2011) RFC 6066 (Proposed Standard)
    • Eastlake, D.1
  • 11
    • 57649166927 scopus 로고    scopus 로고
    • You've been warned: An empirical study of the effectiveness of web browser phishing warnings
    • Egelman, S., Cranor, L. F., and Hong, J. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In CHI (2008).
    • (2008) CHI
    • Egelman, S.1    Cranor, L.F.2    Hong, J.3
  • 15
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: Validating SSL certificates in non-browser software
    • Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., and Shmatikov, V. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proc. of CCS 2012 pp. 38-49.
    • (2012) Proc. of CCS , pp. 38-49
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 16
    • 84893092387 scopus 로고    scopus 로고
    • Http strict transport security (hsts)
    • Nov.
    • Hodges, J., Jackson, C., and Barth, A. Http strict transport security (hsts). RFC 6797 Nov. 2012.
    • (2012) RFC 6797
    • Hodges, J.1    Jackson, C.2    Barth, A.3
  • 17
    • 84896456960 scopus 로고    scopus 로고
    • The DNS-based authentication of named entities (DANE): TLSA protocol
    • Aug.
    • Hoffman, P., and Schlyter, J. The DNS-Based Authentication of Named Entities (DANE): TLSA Protocol. RFC 6698, Aug. 2012.
    • (2012) RFC 6698
    • Hoffman, P.1    Schlyter, J.2
  • 18
    • 82955197322 scopus 로고    scopus 로고
    • The SSL landscape: A thorough analysis of the x.509 PKI using active and passive measurements
    • Holz, R., Braun, L., Kammenhuber, N., and Carle, G. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. In Proc. of IMC 2011 .
    • (2011) Proc. of IMC
    • Holz, R.1    Braun, L.2    Kammenhuber, N.3    Carle, G.4
  • 19
    • 79960851673 scopus 로고    scopus 로고
    • Conditioned-safe ceremonies and a user study of an application to web authentication
    • February
    • Karlof, C., Tygar, J., and Wagner, D. Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In Proc. of 16th NDSS (February 2009).
    • (2009) Proc. of 16th NDSS
    • Karlof, C.1    Tygar, J.2    Wagner, D.3
  • 20
    • 84984100041 scopus 로고
    • Response strategies for coping with the cognitive demands of attitude measures in surveys
    • Krosnick, J. Response strategies for coping with the cognitive demands of attitude measures in surveys. Applied cognitive psychology 5, 3 (1991), 213-236.
    • (1991) Applied Cognitive Psychology , vol.5 , Issue.3 , pp. 213-236
    • Krosnick, J.1
  • 24
    • 84858219015 scopus 로고    scopus 로고
    • Internet security under attack: The undermining of digital certificates
    • Leavitt, N. Internet security under attack: The undermining of digital certificates. Computer 44
    • Computer , vol.44
    • Leavitt, N.1
  • 26
  • 28
    • 80052803379 scopus 로고    scopus 로고
    • Do windows users follow the principle of least privilege? Investigating user account control practices
    • Motiee, S., Hawkey, K., and Beznosov, K. Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices. In Proc. of SOUPS (2010).
    • (2010) Proc. of SOUPS
    • Motiee, S.1    Hawkey, K.2    Beznosov, K.3
  • 34
    • 84893053986 scopus 로고    scopus 로고
    • Mozilla Bugzilla
    • Mozilla Bugzilla. Tech Evangelism Bugs. http://is.gd/sqCtFm.
    • Tech Evangelism Bugs
  • 37
    • 41549114402 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31
    • Computer Networks , vol.31
    • Paxson, V.1
  • 40
    • 80054062253 scopus 로고    scopus 로고
    • Representation and verification of domain-based application service identity within internet public key infrastructure using X.509 (PKIX) certificates in the context of transport layer security
    • March
    • Saint-Andre, P., and Hodges, J. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security. RFC 6125, March 2011.
    • (2011) RFC 6125
    • Saint-Andre, P.1    Hodges, J.2
  • 42
    • 84857080633 scopus 로고    scopus 로고
    • Certified lies: Detecting and defeating government interception attacks against ssl (short paper)
    • Soghoian, C., and Stamm, S. Certified lies: Detecting and defeating government interception attacks against ssl (short paper). Financial Cryptography and Data Security (2012), 250-259.
    • (2012) Financial Cryptography and Data Security , pp. 250-259
    • Soghoian, C.1    Stamm, S.2
  • 43
    • 84855660944 scopus 로고    scopus 로고
    • On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
    • Sotirakopoulos, A., Hawkey, K., and Beznosov, K. On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. In Proc. of SOUPS 2011 pp. 3:1-3:18.
    • (2011) Proc. of SOUPS , pp. 31-318
    • Sotirakopoulos, A.1    Hawkey, K.2    Beznosov, K.3
  • 47
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSH-style host authentication with multi-path probing
    • Wendlandt, D., Andersen, D. G., and Perrig, A. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. USENIX ATC (2008).
    • (2008) USENIX ATC
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3
  • 48
    • 32244434492 scopus 로고    scopus 로고
    • Gathering evidence: Use of visual security cues in web browsers
    • Whalen, T., and Inkpen, K. Gathering evidence: use of visual security cues in web browsers. In Proc. of Graphics Interface 2005 (2005), pp. 137-144.
    • (2005) Proc. of Graphics Interface 2005 , pp. 137-144
    • Whalen, T.1    Inkpen, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.