2017
DOI: 10.1145/3139294
|View full text |Cite
|
Sign up to set email alerts
|

Server Location Verification (SLV) and Server Location Pinning

Abstract: We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication (e.g., augmenting TLS) by enabling browsers to automatically interpret server location information. We describe the design of this new measurement-based technique, Server Location Verification (SLV), and evaluate it using PlanetLab. We explain how SLV is compatible with the increasing trends of geographically distributed content dissemination over the Internet, without causin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 43 publications
0
16
0
Order By: Relevance
“…The browser can either perform automatic verification (e.g., during the TLS handshake) of the location information or directly display it to the user. Abdou and van Oorschot proposed similar methods of augmenting TLS by actively estimating website locations using delay-based measurements from multiple locations [2]. These approaches leverage the uniqueness and verifiability of private web server locations to supplement existing server authentication.…”
Section: B Website Location and Authenticationmentioning
confidence: 99%
See 4 more Smart Citations
“…The browser can either perform automatic verification (e.g., during the TLS handshake) of the location information or directly display it to the user. Abdou and van Oorschot proposed similar methods of augmenting TLS by actively estimating website locations using delay-based measurements from multiple locations [2]. These approaches leverage the uniqueness and verifiability of private web server locations to supplement existing server authentication.…”
Section: B Website Location and Authenticationmentioning
confidence: 99%
“…Since we are investigating users' involvement with location information, we inherit the same attacker model proposed in related work on TLS [11] and website location authentication [2], [39]. Specifically, we assume that the attacker is able to impersonate the server by compromising its public key certificate, e.g., by obtaining a fraudulent certificate from a compromised CA or learning the server's private key.…”
Section: Research Overviewmentioning
confidence: 99%
See 3 more Smart Citations