Mostrar el registro sencillo del ítem
Coming of Age: A Longitudinal Study of TLS Deployment
dc.contributor.author | Kotzias, Platon | |
dc.contributor.author | Razaghpanah, Abbas | |
dc.contributor.author | Amann, Johanna | |
dc.contributor.author | Paterson, Kenneth G. | |
dc.contributor.author | Vallina-Rodriguez, Narseo | |
dc.contributor.author | Caballero, Juan | |
dc.date.accessioned | 2021-07-13T09:35:21Z | |
dc.date.available | 2021-07-13T09:35:21Z | |
dc.date.issued | 2018-10-31 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12761/617 | |
dc.description | https://doi.org/10.1145/3278532.3278568 | |
dc.description.abstract | The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted communication on the Internet. However, it has been plagued by a number of different attacks and security issues over the last years. Addressing these attacks requires changes to the protocol, to server- or client-software, or to all of them. In this paper we conduct the first large-scale longitudinal study examining the evolution of the TLS ecosystem over the last six years. We place a special focus on the ecosystem’s evolution in response to high-profile attacks. For our analysis, we use a passive measurement dataset with more than 319.3B connections since February 2012, and an active dataset that contains TLS and SSL scans of the entire IPv4 address space since August 2015. To identify the evolution of specific clients we also create the—to our knowledge—largest TLS client fingerprint database to date, consisting of 1,684 fingerprints. We observe that the ecosystem has shifted significantly since 2012, with major changes in which cipher suites and TLS extensions are offered by clients and accepted by servers having taken place. Where possible, we correlate these with the timing of specific attacks on TLS. At the same time, our results show that while clients, especially browsers, are quick to adopt new algorithms, they are also slow to drop support for older ones. We also encounter significant amounts of client software that probably unwittingly offer unsafe ciphers. We discuss these findings in the context of long tail effects in the TLS ecosystem. | |
dc.language.iso | eng | |
dc.title | Coming of Age: A Longitudinal Study of TLS Deployment | en |
dc.type | conference object | |
dc.conference.date | 31 October - 2 November 2018 | |
dc.conference.place | Boston, MA, USA | |
dc.conference.title | The 18th ACM Internet Measurement Conference (ACM IMC 2018) | * |
dc.event.type | conference | |
dc.pres.type | paper | |
dc.type.hasVersion | VoR | |
dc.rights.accessRights | open access | |
dc.description.refereed | TRUE | |
dc.description.status | pub | |
dc.eprint.id | http://eprints.networks.imdea.org/id/eprint/1884 |