Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243790
|View full text |Cite
|
Sign up to set email alerts
|

Domain Validation++ For MitM-Resilient PKI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
51
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 47 publications
(51 citation statements)
references
References 19 publications
0
51
0
Order By: Relevance
“…The idea is to inject a spoofed fragment into IP defragmentation cache that is to be reassembled with the real fragment from the nameserver, and so to inject malicious payload into the DNS response. Fragmentation is a popularly exploited attack vector for attacks against different systems and protocols [1], [25]- [27].…”
Section: Introductionmentioning
confidence: 99%
“…The idea is to inject a spoofed fragment into IP defragmentation cache that is to be reassembled with the real fragment from the nameserver, and so to inject malicious payload into the DNS response. Fragmentation is a popularly exploited attack vector for attacks against different systems and protocols [1], [25]- [27].…”
Section: Introductionmentioning
confidence: 99%
“…De facto ownership for establishing security proved useful in bootstrapping TLS, as reflected by the popular Let's Encrypt service for issuing X.509 TLS certificates [3], [6], [41]. Nevertheless, this approach was shown vulnerable to MitM attacks in the data plane [7], [8] and was later improved by utilizing control plane information for performing validation [10]. DISCO's decentralized approach for certifying ownership over IP address blocks resembles the design of the Convergence system for validating the correctness of TLS certificates [42].…”
Section: Related Workmentioning
confidence: 99%
“…While CA-TMS [30] and [31] collects information about CAs reputation from users, and they restrict CAs' scope using the reputation data gathered from their clients. References [9], [10] successfully attacked several eminent domain validation-based commercially used CAs and showed that their certificate-issuance process itself is exposed to MitM attacks. References [9], [10] suggested several recommendations to mitigate attacks against the domain validation-based certificate-issuance process.…”
Section: Related Workmentioning
confidence: 99%
“…References [9], [10] successfully attacked several eminent domain validation-based commercially used CAs and showed that their certificate-issuance process itself is exposed to MitM attacks. References [9], [10] suggested several recommendations to mitigate attacks against the domain validation-based certificate-issuance process. The proposals are defenseless against attackers capable of compromising CAs' private-key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation