Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2420953
|View full text |Cite
|
Sign up to set email alerts
|

One year of SSL internet measurement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(25 citation statements)
references
References 4 publications
0
25
0
Order By: Relevance
“…The long-term monitoring and measurement of SSL/TLS traffic in the Internet was presented by Levillain et al [9] for the period 2010-2011. They observed a lot of servers which were intolerant to some cipher suite lists, and detected certificate chains which did not comply with the standard.…”
Section: State-of-the-artmentioning
confidence: 99%
See 1 more Smart Citation
“…The long-term monitoring and measurement of SSL/TLS traffic in the Internet was presented by Levillain et al [9] for the period 2010-2011. They observed a lot of servers which were intolerant to some cipher suite lists, and detected certificate chains which did not comply with the standard.…”
Section: State-of-the-artmentioning
confidence: 99%
“…In comparison to earlier results, the share of connections initiated over SSL is decreasing. For example, Levillain et al [9] reported 5 % share of SSL 3.0 in 2011.…”
Section: A Measurementmentioning
confidence: 99%
“…In particular, these studies have identified specific problematic certificates [17], [18] and quantified interesting patterns [12]- [17]. In this paper we aim to go beyond those previous studies by providing a detailed analysis of compliance with specific guidelines, and also in the development of particular analysis and visualization methods.…”
Section: Rootmentioning
confidence: 99%
“…The long-term SSL/TLS traffic identify in the Internet was presented by Levillain and Ebalard in 2010 [2] . They detected certificate chains which did not comply with the standard through SSL/TLS handshake fingerprint.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, we are able to identify browsers through the features in plain-text network traffic, such as User-Agent and Cookies [2], but with the rising popularity of encryption network protocol, it becomes impossible to get these features.…”
Section: Introductionmentioning
confidence: 99%