Proceedings of the 2014 Conference on Internet Measurement Conference 2014
DOI: 10.1145/2663716.2663758
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of SSL certificate reissues and revocations in the wake of heartbleed

Abstract: Central to the secure operation of a public key infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having a proper understanding of how often systems administrators reissue and revoke certificates is crucial to understanding the integrity of a PKI. Unfortunately, this is typically difficult to measure: while it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 59 publications
(23 citation statements)
references
References 13 publications
0
23
0
Order By: Relevance
“…Our results show that: (1) 96% of the time RevCast can transmit all revocations within 10 seconds, (2) the nothing-since attestations are remarkably effective at eliminating CRL checks, and (3) when there were extreme revocation rates as a result of the widespread Heartbleed vulnerability [30], 70% of the time RevCast could transmit all revocations within 10 seconds. Further, we reinforce the validity of the tracedriven simulation by studying the CA revocation behavior our dataset.…”
Section: Trace-based Evaluationmentioning
confidence: 86%
See 2 more Smart Citations
“…Our results show that: (1) 96% of the time RevCast can transmit all revocations within 10 seconds, (2) the nothing-since attestations are remarkably effective at eliminating CRL checks, and (3) when there were extreme revocation rates as a result of the widespread Heartbleed vulnerability [30], 70% of the time RevCast could transmit all revocations within 10 seconds. Further, we reinforce the validity of the tracedriven simulation by studying the CA revocation behavior our dataset.…”
Section: Trace-based Evaluationmentioning
confidence: 86%
“…The dataset of certificate revocations that we analyze were collected by Zhang et al [30] from the CRLs for public-facing SSL servers on the Internet. Rapid7 2 collected SSL certificates from the entire IPv4 address space from October 2013 to April 2014.…”
Section: Crl Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, thousands of certificates were revoked over a few days. The detailed analysis of this event is presented by Durumeric et al [19] and Zhang et al [46]. Fig.…”
Section: A Dataset Usedmentioning
confidence: 99%
“…As a consequence, in mid-April 2014 we observed the highest frequency of certificate re-issuance and revocation ever. This unique event and its impact on the TLS ecosystem has been thoroughly analyzed [16], [44]. We evaluated the bandwidth required by PKISN during normal operations (i.e., a few months before Heartbleed) and during what we will refer to as the peak time (i.e., right after Heartbleed was announced).…”
Section: Bandwidthmentioning
confidence: 99%