You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates

Richard Roberts
Richard Roberts
Yaelle Goldschlag
Yaelle Goldschlag
Rachel Walter
Rachel Walter

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2489-2504, 2019.

Cited by: 3|Bibtex|Views108|DOI:https://doi.org/10.1145/3319535.3363188
EI
Other Links: dl.acm.org|dblp.uni-trier.de|academic.microsoft.com

Abstract:

The public key infrastructure (PKI) provides the fundamental property of authentication: the means by which users can know with whom they are communicating online. The PKI ensures end-to-end authenticity insofar as it verifies a chain of certificates, but the true final step in end-to-end authentication comes when the user verifies that t...More

Code:

Data:

Your rating :
0

 

Tags
Comments