-
2
-
-
84893064894
-
-
TR-12-014, ICSI Nov.
-
Amann, B., Vallentin, M., Hall, S., and Sommer, R. Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service. TR-12-014, ICSI Nov. 2012. http://is.gd/EMt2Kz.
-
(2012)
Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service
-
-
Amann, B.1
Vallentin, M.2
Hall, S.3
Sommer, R.4
-
4
-
-
84855681364
-
The security cost of cheap user interaction
-
Böhme, R., and Grossklags, J. The Security Cost of Cheap User Interaction. In Proc. of NSPW 2011
-
(2011)
Proc. of NSPW
-
-
Böhme, R.1
Grossklags, J.2
-
6
-
-
84888009741
-
-
Convergence. http://www.convergence.io.
-
Convergence
-
-
-
7
-
-
51049122345
-
Internet X.509 public key infrastructure certificate and certificate revocation list profile
-
May
-
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and Polk, W. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile. RFC 5280, May 2008.
-
(2008)
RFC 5280
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
9
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Dreger, H., Feldmann, A., Mai, M., Paxson, V., and Sommer, R. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In Proc. of USENIX Security Symp. (2006).
-
(2006)
Proc. of USENIX Security Symp.
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Sommer, R.5
-
10
-
-
84955468238
-
Transport layer security (TLS) extensions: Extension definitions
-
Jan.
-
Eastlake, D. Transport Layer Security (TLS) Extensions: Extension Definitions. RFC 6066 (Proposed Standard), Jan. 2011.
-
(2011)
RFC 6066 (Proposed Standard)
-
-
Eastlake, D.1
-
11
-
-
57649166927
-
You've been warned: An empirical study of the effectiveness of web browser phishing warnings
-
Egelman, S., Cranor, L. F., and Hong, J. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In CHI (2008).
-
(2008)
CHI
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
13
-
-
84869487159
-
Why eve and mallory love android: An analysis of android SSL (in)security
-
Fahl, S., Harbach, M., Muders, T., Smith, M., Baumgärtner, L., and Freisleben, B. Why Eve and Mallory Love Android: An Analysis of Android SSL (In)security. In Proc. of CCS 2012 pp. 50-61.
-
(2012)
Proc. of CCS
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgärtner, L.5
Freisleben, B.6
-
14
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In Proc. of SOUPS (2012).
-
(2012)
Proc. of SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
15
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., and Shmatikov, V. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proc. of CCS 2012 pp. 38-49.
-
(2012)
Proc. of CCS
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
17
-
-
84896456960
-
The DNS-based authentication of named entities (DANE): TLSA protocol
-
Aug.
-
Hoffman, P., and Schlyter, J. The DNS-Based Authentication of Named Entities (DANE): TLSA Protocol. RFC 6698, Aug. 2012.
-
(2012)
RFC 6698
-
-
Hoffman, P.1
Schlyter, J.2
-
18
-
-
82955197322
-
The SSL landscape: A thorough analysis of the x.509 PKI using active and passive measurements
-
Holz, R., Braun, L., Kammenhuber, N., and Carle, G. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements. In Proc. of IMC 2011 .
-
(2011)
Proc. of IMC
-
-
Holz, R.1
Braun, L.2
Kammenhuber, N.3
Carle, G.4
-
19
-
-
79960851673
-
Conditioned-safe ceremonies and a user study of an application to web authentication
-
February
-
Karlof, C., Tygar, J., and Wagner, D. Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In Proc. of 16th NDSS (February 2009).
-
(2009)
Proc. of 16th NDSS
-
-
Karlof, C.1
Tygar, J.2
Wagner, D.3
-
20
-
-
84984100041
-
Response strategies for coping with the cognitive demands of attitude measures in surveys
-
Krosnick, J. Response strategies for coping with the cognitive demands of attitude measures in surveys. Applied cognitive psychology 5, 3 (1991), 213-236.
-
(1991)
Applied Cognitive Psychology
, vol.5
, Issue.3
, pp. 213-236
-
-
Krosnick, J.1
-
24
-
-
84858219015
-
Internet security under attack: The undermining of digital certificates
-
Leavitt, N. Internet security under attack: The undermining of digital certificates. Computer 44
-
Computer
, vol.44
-
-
Leavitt, N.1
-
25
-
-
84864273340
-
Ron was wrong, Whit is right
-
Lenstra, A., Hughes, J., Augier, M., Bos, J., Kleinjung, T., and Wachter, C. Ron was wrong, Whit is right. IACR eprint archive 64 (2012).
-
(2012)
IACR Eprint Archive
, vol.64
-
-
Lenstra, A.1
Hughes, J.2
Augier, M.3
Bos, J.4
Kleinjung, T.5
Wachter, C.6
-
26
-
-
84893133508
-
-
StartSSL Free. https://www.startssl.com.
-
StartSSL Free
-
-
-
28
-
-
80052803379
-
Do windows users follow the principle of least privilege? Investigating user account control practices
-
Motiee, S., Hawkey, K., and Beznosov, K. Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices. In Proc. of SOUPS (2010).
-
(2010)
Proc. of SOUPS
-
-
Motiee, S.1
Hawkey, K.2
Beznosov, K.3
-
34
-
-
84893053986
-
-
Mozilla Bugzilla
-
Mozilla Bugzilla. Tech Evangelism Bugs. http://is.gd/sqCtFm.
-
Tech Evangelism Bugs
-
-
-
37
-
-
41549114402
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31
-
Computer Networks
, vol.31
-
-
Paxson, V.1
-
40
-
-
80054062253
-
Representation and verification of domain-based application service identity within internet public key infrastructure using X.509 (PKIX) certificates in the context of transport layer security
-
March
-
Saint-Andre, P., and Hodges, J. Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security. RFC 6125, March 2011.
-
(2011)
RFC 6125
-
-
Saint-Andre, P.1
Hodges, J.2
-
42
-
-
84857080633
-
Certified lies: Detecting and defeating government interception attacks against ssl (short paper)
-
Soghoian, C., and Stamm, S. Certified lies: Detecting and defeating government interception attacks against ssl (short paper). Financial Cryptography and Data Security (2012), 250-259.
-
(2012)
Financial Cryptography and Data Security
, pp. 250-259
-
-
Soghoian, C.1
Stamm, S.2
-
43
-
-
84855660944
-
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
-
Sotirakopoulos, A., Hawkey, K., and Beznosov, K. On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. In Proc. of SOUPS 2011 pp. 3:1-3:18.
-
(2011)
Proc. of SOUPS
, pp. 31-318
-
-
Sotirakopoulos, A.1
Hawkey, K.2
Beznosov, K.3
-
44
-
-
84926351578
-
Crying wolf: An empirical study of SSL warning effectiveness
-
Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the 18th Usenix Security Symposium (2009).
-
(2009)
Proceedings of the 18th Usenix Security Symposium
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
46
-
-
84885004025
-
The inconvenient truth about web certificates
-
Vratonjic, N., Freudiger, J., Bindschaedler, V., and Hubaux, J. The inconvenient truth about web certificates. In Proc. of WEIS (2011), 79-117.
-
(2011)
Proc. of WEIS
, pp. 79-117
-
-
Vratonjic, N.1
Freudiger, J.2
Bindschaedler, V.3
Hubaux, J.4
-
47
-
-
85034040740
-
Perspectives: Improving SSH-style host authentication with multi-path probing
-
Wendlandt, D., Andersen, D. G., and Perrig, A. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. USENIX ATC (2008).
-
(2008)
USENIX ATC
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
48
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsers
-
Whalen, T., and Inkpen, K. Gathering evidence: use of visual security cues in web browsers. In Proc. of Graphics Interface 2005 (2005), pp. 137-144.
-
(2005)
Proc. of Graphics Interface 2005
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.2
|