HTTPS is a cornerstone of privacy in the modern Web. The public key infrastructure underlying HTTPS, however, is a frequent target of attacks. In several cases, forged certificates have been issued by compromised Certificate Authorities (CA) and used to spy on users at large scale. While the concept of Certificate Transparency (CT) provides a means for detecting such forgeries, it builds on a distributed system of CT logs whose correctness is still insufficiently protected. By compromising a certificate authority and the corresponding log, a covert adversary can still issue rogue certificates unnoticed
High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) ...
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites...
International audienceThe security of public key validation protocols for web-based applications has...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
The security of the web improved greatly throughout the last couple of years. A large majority of th...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Abstract. The existing HTTPS public-key infrastructure (PKI) uses a coarse-grained trust model: eith...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verifi...
High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) ...
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites...
International audienceThe security of public key validation protocols for web-based applications has...
Many of today’s web-based services rely heavily on secure end-to-end connections. The “trust” that t...
Certificate transparency (CT) is a system that publishes all issued certificates so that they can be...
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the i...
The security of the web improved greatly throughout the last couple of years. A large majority of th...
Security on the Internet is essential to ensure the privacy of an individual. Today, Trans- port Lay...
Abstract. The existing HTTPS public-key infrastructure (PKI) uses a coarse-grained trust model: eith...
Internet security and privacy stand on the trustworthiness of public certificates signed by Certific...
Creating a secure connection on the Internet is made possible through the usage of certificates, bin...
Recent trends in public-key infrastructure research explore the tradeoff between decreased trust in ...
Certificate Transparency provides auditability to the widely used X.509 Public Key Infrastructure (P...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verifi...
High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) ...
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites...
International audienceThe security of public key validation protocols for web-based applications has...