Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660376
|View full text |Cite
|
Sign up to set email alerts
|

RevCast

Abstract: The ability to revoke certificates is a fundamental feature of a public key infrastructure. However, certificate revocation systems are generally regarded as ineffective and potentially insecure: Some browsers bundle revocation updates with more general software updates, and may go hours, days, or indefinitely between updates; moreover, some operating systems make it difficult for users to demand recent revocation data. This paper argues that this sad state of affairs is an inexorable consequence of relying on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…We did not include certificate transparency in our SoK since it is a moderation of identities rather than content. However, certificate transparency often performs fully client-private exact matching with negligible or zero false positives, often by pushing as much as possible to the client [219,263,286,330,338,343,345].…”
Section: Detectionmentioning
confidence: 99%
“…We did not include certificate transparency in our SoK since it is a moderation of identities rather than content. However, certificate transparency often performs fully client-private exact matching with negligible or zero false positives, often by pushing as much as possible to the client [219,263,286,330,338,343,345].…”
Section: Detectionmentioning
confidence: 99%
“…CRLite uses a filter cascade to compress the set of revoked certificates [76]. Schulman et al proposes a method for disseminating revocation data over FM radio [106]. The efforts of CAs and website administrators are, however, pointless if user-agents do not perform OCSP lookups or utilize the response, as has been observed in prior work [81].…”
Section: Related Workmentioning
confidence: 99%