Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290605.3300540
|View full text |Cite
|
Sign up to set email alerts
|

On the Usability of HTTPS Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 8 publications
1
9
0
Order By: Relevance
“…Our work suggests that the current approach of sub-optimal defaults along with online recommendations that guide operators to fix those settings, is fundamentally broken. We echo previous studies' calls for fixing systems to be secure by default [36,57]. We also encourage future studies to consider SaaS services separately from individually-configured services since aggregate statistics can otherwise be misleading.…”
Section: Introductionsupporting
confidence: 67%
See 1 more Smart Citation
“…Our work suggests that the current approach of sub-optimal defaults along with online recommendations that guide operators to fix those settings, is fundamentally broken. We echo previous studies' calls for fixing systems to be secure by default [36,57]. We also encourage future studies to consider SaaS services separately from individually-configured services since aggregate statistics can otherwise be misleading.…”
Section: Introductionsupporting
confidence: 67%
“…The HTTPS ecosystem and Web PKI has been subject to much attention and there is a large body of prior work analyzing server usability and misconfiguration [36,57], TLS clients and interception [40,46,51,54], server configuration [42,43,56,60,70], TLS attacks [10, 29-31, 34, 35, 37, 38, 45, 50, 71, 72], and Web PKI [32,39,44,52,74]. We highlight relevant prior work below.…”
Section: Related Workmentioning
confidence: 99%
“…Prior to our work, the process of obtaining a certificate and configuring an HTTPS server was often manual and tedious [22]. First, system administrators had to recognize that they needed a certificate and navigate the confusing marketplace.…”
Section: Obtaining and Installing A Certificatementioning
confidence: 99%
“…A major barrier to wider HTTPS adoption was that deploying it was complicated, expensive, and error-prone for server operators [22,57]. Most of the difficulty involved interactions with Certificate Authorities (CAs), entities trusted by Web browsers to validate a server's identity and issue a digitally signed certificate binding the identity to the server's public key.…”
Section: Introductionmentioning
confidence: 99%
“…For example, access to good documentation and reliable example code have significant impacts on solving security tasks Fischer et al, 2017;Mindermann and Wagner, 2018;Mindermann and Wager, 2020), as does priming (Naiakshina et al, 2018). Usability issues can also impact the appropriate use of other security-related systems, including Android development (Acar et al, 2016), cryptographic APIs Gorski et al, 2018;Naiakshina et al, 2019;Oliveira et al, 2018;Zeier et al, 2019), type systems (Weber et al, 2017), HTTPS deployment (Krombholz et al, 2017;Bernhard et al, 2019), OpenSSL (Ukrop and Matyas, 2018), and string and I/O APIs (Oliveira et al, 2018).…”
Section: Introductionmentioning
confidence: 99%