-
1
-
-
84896456624
-
Highlights from making sense of Snowden part II: What's significant in the NSA revelations
-
S. Landau, "Highlights from making sense of Snowden, part II: What's significant in the NSA revelations, " IEEE Security & Privacy, vol. 12, pp. 62-64, 2014.
-
(2014)
IEEE Security & Privacy
, vol.12
, pp. 62-64
-
-
Landau, S.1
-
4
-
-
84874239302
-
Tag size does matter: Attacks and proofs for the TLS record protocol
-
K. G. Paterson, T. Ristenpart, and T. Shrimpton, "Tag size does matter: Attacks and proofs for the TLS record protocol, " in ASIACRYPT, 2011.
-
(2011)
ASIACRYPT
-
-
Paterson, K.G.1
Ristenpart, T.2
Shrimpton, T.3
-
5
-
-
85014848459
-
On the security of the TLS protocol: A systematic analysis
-
H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS protocol: A systematic analysis, " in CRYPTO, 2013.
-
(2013)
CRYPTO
-
-
Krawczyk, H.1
Paterson, K.G.2
Wee, H.3
-
6
-
-
84914134891
-
Implementing TLS with veriffed cryptographic security
-
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P. Strub, "Implementing TLS with veriffed cryptographic security, " in IEEE S&P, 2013.
-
(2013)
IEEE S&P
-
-
Bhargavan, K.1
Fournet, C.2
Kohlweiss, M.3
Pironti, A.4
Strub, P.5
-
7
-
-
34447131375
-
Transport layer security (TLS) Extensions
-
S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, and T. Wright, "Transport Layer Security (TLS) Extensions, " IETF RFC 3546, 2003.
-
(2003)
IETF RFC 3546
-
-
Blake-Wilson, S.1
Nystrom, M.2
Hopwood, D.3
Mikkelsen, J.4
Wright, T.5
-
8
-
-
84890078634
-
Analysis of the HTTPS certificate ecosystem
-
Oct
-
Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman, "Analysis of the HTTPS certificate ecosystem, " in IMC, Oct. 2013.
-
(2013)
IMC
-
-
Durumeric, Z.1
Kasten, J.2
Bailey, M.3
Halderman, J.A.4
-
9
-
-
85048055531
-
Web PKI: Closing the gap between guidelines and practices
-
Feb
-
A. Delignat-Lavaud, M. Abadi, M. Birrell, I. Mironov, T. Wobber, and Y. Xie, "Web PKI: closing the gap between guidelines and practices, " in NDSS, Feb 2014.
-
(2014)
NDSS
-
-
Delignat-Lavaud, A.1
Abadi, M.2
Birrell, M.3
Mironov, I.4
Wobber, T.5
Xie, Y.6
-
15
-
-
84995402015
-
When HTTPS meets CDN: A case of authentication in delegated service
-
J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, "When HTTPS meets CDN: A case of authentication in delegated service, " in IEEE S&P, 2014.
-
(2014)
IEEE S&P
-
-
Liang, J.1
Jiang, J.2
Duan, H.3
Li, K.4
Wan, T.5
Wu, J.6
-
20
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
A. Barth, C. Jackson, and J. C. Mitchell, "Robust defenses for cross-site request forgery, " in CCS, 2008.
-
(2008)
CCS
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
23
-
-
84929646647
-
-
M. Schloesser, B. Gamble, J. Nickel, C. Guarnieri, and H. D. Moore, "Project sonar: IPv4 SSL certificates, " https://scans.io/study/sonar.ssl, 2013.
-
(2013)
Project Sonar: IPv4 SSL Certificates
-
-
Schloesser, M.1
Gamble, B.2
Nickel, J.3
Guarnieri, C.4
Moore, H.D.5
-
24
-
-
84968898887
-
-
Alexa Internet Inc Top 1 000, 000 sites (updated daily)
-
Alexa Internet Inc., "Top 1, 000, 000 sites (updated daily), " http://goo.gl/OZdT6p, 2014.
-
(2014)
-
-
-
25
-
-
84968849847
-
-
CSNT IEEE
-
S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh, "Formal verification of oauth 2.0 using alloy framework, " in CSNT. IEEE, 2011.
-
(2011)
Formal Verification of Oauth 2.0 Using Alloy Framework
-
-
Pai, S.1
Sharma, Y.2
Kumar, S.3
Pai, R.M.4
Singh, S.5
-
28
-
-
77957587422
-
Towards a formal foundation of web security
-
D. Akhawe, A. Barth, P. Lam, J. Mitchell, and D. Song, "Towards a formal foundation of web security, " in CSF, 2010, pp. 290-304.
-
(2010)
CSF
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.3
Mitchell, J.4
Song, D.5
-
31
-
-
84940397122
-
-
Usenix Security
-
M. Dietz, A. Czeskis, D. Balfanz, and D. S. Wallach, "Origin-bound certificates: A fresh approach to strong client authentication, " in Usenix Security, 2012.
-
(2012)
Origin-bound Certificates: A Fresh Approach to Strong Client Authentication
-
-
Dietz, M.1
Czeskis, A.2
Balfanz, D.3
Wallach, D.S.4
-
32
-
-
84921457533
-
-
IEEE S&P. IEEE
-
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, , A. Pironti, and P.-Y. Strub, "Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS, " in IEEE S&P. IEEE, 2014.
-
(2014)
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
Fournet, C.3
Pironti, A.4
Strub, P.-Y.5
-
35
-
-
84914182772
-
When HTTPS meets CDN: A case of authentication in delegated service
-
IEEE
-
J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu, "When HTTPS meets CDN: A case of authentication in delegated service, " in IEEE Symposium on Security & Privacy 2014 (Oakland'14). IEEE, 2014.
-
(2014)
IEEE Symposium on Security & Privacy 2014 Oakland'14
-
-
Liang, J.1
Jiang, J.2
Duan, H.3
Li, K.4
Wan, T.5
Wu, J.6
-
44
-
-
58849088038
-
Protecting browsers from DNS rebinding attacks
-
C. Jackson, A. Barth, A. Bortz, W. Shao, and D. Boneh, "Protecting browsers from DNS rebinding attacks, " TWEB, vol. 3, no. 1, 2009.
-
(2009)
TWEB
, vol.3
, Issue.1
-
-
Jackson, C.1
Barth, A.2
Bortz, A.3
Shao, W.4
Boneh, D.5
-
46
-
-
84968897504
-
-
CCS
-
D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee, "Increased DNS forgery resistance by 0x20-bit encoding: security via leet queries, " in CCS, 2008.
-
(2008)
Increased DNS Forgery Resistance by 0x20-bit Encoding: Security Via Leet Queries
-
-
Dagon, D.1
Antonakakis, M.2
Vixie, P.3
Jinmei, T.4
Lee, W.5
-
49
-
-
77952370957
-
-
in CCS
-
C. Karlof, U. Shankar, J. D. Tygar, and D. Wagner, "Dynamic pharming attacks and locked same-origin policies for web browsers, " in CCS, 2007.
-
(2007)
Dynamic Pharming Attacks and Locked Same-origin Policies for Web Browsers
-
-
Karlof, C.1
Shankar, U.2
Tygar, J.D.3
Wagner, D.4
-
50
-
-
84869429339
-
-
ACM CCS
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov, "The most dangerous code in the world: validating SSL certificates in non-browser software, " in ACM CCS, 2012.
-
(2012)
The Most Dangerous Code in the World: Validating SSL Certificates in Non-browser Software
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
51
-
-
84890107028
-
-
WWW
-
D. Akhawe, B. Amann, M. Vallentin, and R. Sommer, "Here's my cert, so trust me, maybe? understanding TLS errors on the web, " in WWW, 2013.
-
(2013)
Here's My Cert, so Trust Me, Maybe? Understanding TLS Errors on the Web
-
-
Akhawe, D.1
Amann, B.2
Vallentin, M.3
Sommer, R.4
-
53
-
-
84968921985
-
-
EKOparty Security Conference
-
J. Rizzo and T. Duong, "The CRIME attack, " in EKOparty Security Conference, vol. 2012, 2012.
-
(2012)
The CRIME Attack
, vol.2012
-
-
Rizzo, J.1
Duong, T.2
-
54
-
-
84968702030
-
-
in IEEE S&P
-
B. Beurdouche, K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and J. K. Zinzindohoue, "A messy state of the union: Taming the composite state machines of TLS, " in IEEE S&P, 2015.
-
(2015)
A Messy State of the Union: Taming the Composite State Machines of TLS
-
-
Beurdouche, B.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Fournet, C.4
Kohlweiss, M.5
Pironti, A.6
Strub, P.-Y.7
Zinzindohoue, J.K.8
-
55
-
-
84908260579
-
Certificate transparency
-
B. Laurie, "Certificate transparency, " Commun. ACM, vol. 57, no. 10, 2014.
-
(2014)
Commun ACM
, vol.57
, Issue.10
-
-
Laurie, B.1
-
56
-
-
84910602699
-
-
CCS
-
D. Basin, C. Cremers, T. H.-J. Kim, A. Perrig, R. Sasse, and P. Szalachowski, "ARPKI: Attack resilient public-key infrastructure, " in CCS, 2014.
-
(2014)
ARPKI: Attack Resilient Public-key Infrastructure
-
-
Basin, D.1
Cremers, C.2
Kim, T.H.-J.3
Perrig, A.4
Sasse, R.5
Szalachowski, P.6
|