DC ElementWertSprache
dc.contributor.authorScheitle, Quirin
dc.contributor.authorGasser, Oliver
dc.contributor.authorNolte, Theodor
dc.contributor.authorAmann, Johanna
dc.contributor.authorBrent, Lexi
dc.contributor.authorCarle, Georg
dc.contributor.authorHolz, Ralph
dc.contributor.authorSchmidt, Thomas
dc.contributor.authorWählisch, Matthias
dc.date.accessioned2020-08-26T09:13:51Z-
dc.date.available2020-08-26T09:13:51Z-
dc.date.issued2018-10
dc.identifier.urihttp://hdl.handle.net/20.500.12738/686-
dc.description.abstractIn this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now a majority of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.
dc.publisherNew York, USA ; Association for Computing Machinery
dc.titleThe Rise of Certificate Transparency and Its Implications on the Internet Ecosystem
dc.typeinProceedings
dc.relation.conferenceInternet Measurement Conference - IMC ; Association of the Computing Machinery ; Boston, MA
tuhh.container.endpage349
tuhh.container.startpage343
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatik
tuhh.publication.instituteFakultät Technik und Informatik
tuhh.publisher.doi10.1145/3278532.3278562
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dcterms.DCMITypeText-
item.creatorGNDScheitle, Quirin-
item.creatorGNDGasser, Oliver-
item.creatorGNDNolte, Theodor-
item.creatorGNDAmann, Johanna-
item.creatorGNDBrent, Lexi-
item.creatorGNDCarle, Georg-
item.creatorGNDHolz, Ralph-
item.creatorGNDSchmidt, Thomas-
item.creatorGNDWählisch, Matthias-
item.fulltextNo Fulltext-
item.creatorOrcidScheitle, Quirin-
item.creatorOrcidGasser, Oliver-
item.creatorOrcidNolte, Theodor-
item.creatorOrcidAmann, Johanna-
item.creatorOrcidBrent, Lexi-
item.creatorOrcidCarle, Georg-
item.creatorOrcidHolz, Ralph-
item.creatorOrcidSchmidt, Thomas-
item.creatorOrcidWählisch, Matthias-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
item.openairetypeinProceedings-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0002-0956-7885-
crisitem.author.parentorgFakultät Technik und Informatik-
Enthalten in den Sammlungen:Publications without full text
Zur Kurzanzeige

Seitenansichten

66
checked on 27.12.2024

Google ScholarTM

Prüfe

HAW Katalog

Prüfe

Volltext ergänzen

Feedback zu diesem Datensatz


Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.