2018
DOI: 10.3233/jcs-16891
|View full text |Cite
|
Sign up to set email alerts
|

Invalid certificates in modern browsers: A socio-technical analysis

Abstract: The authentication of a web server is a crucial procedure in the security of web browsing. It relies on certificate validation, a process that may require the participation of the user. Thus, the security of certificate validation is socio-technical as it depends on traditional security technology as well as on social elements such as cultural values, trust and human-computer interaction.This manuscript analyzes extensively the socio-technical security of certificate validation as carried out through today's m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 44 publications
(53 reference statements)
0
3
0
Order By: Relevance
“…Giustolisi et al take a UML and model checking approach to analyse TLS certificate validation as carried out by modern browsers. They focus on security properties that also depend on user interaction, but users do not deviate from the possible choices that each browser supports [26]. Martina et al [6] and more recently Martimiano and Martina [27] reinforce the need to shift away from the classical Dolev-Yao attacker model to capture human-centred threats.…”
Section: Related Workmentioning
confidence: 99%
“…Giustolisi et al take a UML and model checking approach to analyse TLS certificate validation as carried out by modern browsers. They focus on security properties that also depend on user interaction, but users do not deviate from the possible choices that each browser supports [26]. Martina et al [6] and more recently Martimiano and Martina [27] reinforce the need to shift away from the classical Dolev-Yao attacker model to capture human-centred threats.…”
Section: Related Workmentioning
confidence: 99%
“…Bella et al argue that security measures should become invisible or beautiful/dictatorial to stimulate the user to participate more willingly [Bella 2020]. They bring to attention that a security analysis should account for other socio-technical facets of the task that the user is trying to accomplish as well, for example when surfing the Internet [Giustolisi et al 2018]. With all this in mind, we adhered to Bella and Coles-Kemp's approach for specifying and verifying security ceremonies, comprised of five layers, which can be folded or unfolded to focus on specific details one would like to assert [Bella and Coles-Kemp 2012].…”
Section: Introductionmentioning
confidence: 99%
“…Example technical systems are protocols , such as the HTTP protocol, and notably protocols that also incorporate security measures, namely security protocols , such as the HTTPS security protocol. Correspondingly, example socio-technical systems are ceremonies , such as the HTTP ceremony, and notably ceremonies that also incorporate security measures, namely security ceremonies (Ellison, 2007), such as the HTTPS security ceremony (Giustolisi et al , 2018).…”
Section: Introductionmentioning
confidence: 99%