{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:12Z","timestamp":1763468112366,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T00:00:00Z","timestamp":1354492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257497"],"award-info":[{"award-number":["257497"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,3]]},"DOI":"10.1145\/2420950.2420953","type":"proceedings-article","created":{"date-parts":[[2012,12,19]],"date-time":"2012-12-19T14:12:22Z","timestamp":1355926342000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["One year of SSL internet measurement"],"prefix":"10.1145","author":[{"given":"Olivier","family":"Levillain","sequence":"first","affiliation":[{"name":"ANSSI, Paris, France and T\u00e9l\u00e9com Sud Paris, Evry, France"}]},{"given":"Arnaud","family":"\u00c9balard","sequence":"additional","affiliation":[{"name":"ANSSI, Paris, France"}]},{"given":"Benjamin","family":"Morin","sequence":"additional","affiliation":[{"name":"ANSSI, Paris, France"}]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Sud Paris, Evry, France"}]}],"member":"320","published-online":{"date-parts":[[2012,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076752"},{"key":"e_1_3_2_1_2_1","volume-title":"May","author":"Blake-Wilson S.","year":"2006","unstructured":"S. Blake-Wilson , N. Bolyard , V. Gupta , C. Hawk , and B. Moeller . Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational) , May 2006 . S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational), May 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"June","author":"Blake-Wilson S.","year":"2003","unstructured":"S. Blake-Wilson , M. Nystrom , D. Hopwood , J. Mikkelsen , and T. Wright . Transport Layer Security (TLS) Extensions. RFC 3546 (Proposed Standard) , June 2003 . S. Blake-Wilson, M. Nystrom, D. Hopwood, J. Mikkelsen, and T. Wright. Transport Layer Security (TLS) Extensions. RFC 3546 (Proposed Standard), June 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706320"},{"key":"e_1_3_2_1_5_1","volume-title":"EV SSL Certificate Guidelines version 1.3","author":"Forum Browser","year":"2010","unstructured":"CA\/ Browser Forum . EV SSL Certificate Guidelines version 1.3 , 2010 . CA\/Browser Forum. EV SSL Certificate Guidelines version 1.3, 2010."},{"volume-title":"Report of Incident - Comodo detected and thwarted an intrusion on 26-MAR-2011","year":"2011","key":"e_1_3_2_1_6_1","unstructured":"Comodo. Report of Incident - Comodo detected and thwarted an intrusion on 26-MAR-2011 , 2011 . Comodo. Report of Incident - Comodo detected and thwarted an intrusion on 26-MAR-2011, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"May","author":"Cooper D.","year":"2008","unstructured":"D. Cooper , S. Santesson , S. Farrell , S. Boeyen , R. Housley , and W. Polk . Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard) , May 2008 . D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard), May 2008."},{"volume-title":"DSA-1571-1 openssl -- predictable random number generator","year":"2008","key":"e_1_3_2_1_8_1","unstructured":"Debian. DSA-1571-1 openssl -- predictable random number generator , 2008 . Debian. DSA-1571-1 openssl -- predictable random number generator, 2008."},{"key":"e_1_3_2_1_9_1","volume-title":"January","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard) , January 1999 . T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), January 1999."},{"key":"e_1_3_2_1_10_1","volume-title":"April","author":"Dierks T.","year":"2006","unstructured":"T. Dierks and E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard) , April 2006 . T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard), April 2006."},{"key":"e_1_3_2_1_11_1","volume-title":"August","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) , August 2008 . T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"BEAST: Surprising crypto attack against HTTPS","author":"Duong T.","year":"2011","unstructured":"T. Duong and J. Rizzo . BEAST: Surprising crypto attack against HTTPS , 2011 . T. Duong and J. Rizzo. BEAST: Surprising crypto attack against HTTPS, 2011."},{"key":"e_1_3_2_1_13_1","first-page":"18","author":"Eckersley P.","year":"2010","unstructured":"P. Eckersley and J. Burns . An Observatory for the SSLiverse, Talk at Defcon 18 , 2010 . P. Eckersley and J. Burns. An Observatory for the SSLiverse, Talk at Defcon 18, 2010.","journal-title":"An Observatory for the SSLiverse, Talk at Defcon"},{"key":"e_1_3_2_1_14_1","volume-title":"Talk at 27C3","author":"Eckersley P.","year":"2010","unstructured":"P. Eckersley and J. Burns . Is the SSLiverse a safe place? , Talk at 27C3 , 2010 . P. Eckersley and J. Burns. Is the SSLiverse a safe place?, Talk at 27C3, 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Wiretap Politics & Chip Design. O'Reilly","author":"Foundation Electronic Frontier","year":"1998","unstructured":"Electronic Frontier Foundation . Cracking DES. Secrets of Encryption Research , Wiretap Politics & Chip Design. O'Reilly , 1998 . Electronic Frontier Foundation. Cracking DES. Secrets of Encryption Research, Wiretap Politics & Chip Design. O'Reilly, 1998."},{"key":"e_1_3_2_1_16_1","volume-title":"The SSL Protocol Version 3.0","author":"Freier A.","year":"1996","unstructured":"A. Freier , P. Karlton , and P. Kocher . The SSL Protocol Version 3.0 , 1996 . A. Freier, P. Karlton, and P. Kocher. The SSL Protocol Version 3.0, 1996."},{"key":"e_1_3_2_1_17_1","volume-title":"The SSL Protocol","author":"Hickman K.","year":"1994","unstructured":"K. Hickman . The SSL Protocol , 1994 -1995. K. Hickman. The SSL Protocol, 1994-1995."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_3_2_1_19_1","volume-title":"Internet Draft","author":"Langley A.","year":"2011","unstructured":"A. Langley . Unfortunate current practices for HTTP over TLS . Internet Draft , 2011 . A. Langley. Unfortunate current practices for HTTP over TLS. Internet Draft, 2011."},{"key":"e_1_3_2_1_21_1","volume-title":"Internet Explorer SSL Vulnerability","author":"Marlinspike M.","year":"2002","unstructured":"M. Marlinspike . Internet Explorer SSL Vulnerability , 2002 . M. Marlinspike. Internet Explorer SSL Vulnerability, 2002."},{"key":"e_1_3_2_1_22_1","volume-title":"More Tricks For Defeating SSL In Practice","author":"Marlinspike M.","year":"2009","unstructured":"M. Marlinspike . More Tricks For Defeating SSL In Practice , 2009 . M. Marlinspike. More Tricks For Defeating SSL In Practice, 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures","author":"Moeller B.","year":"2002","unstructured":"B. Moeller . Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures , 2002 --2004. B. Moeller. Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures, 2002--2004."},{"key":"e_1_3_2_1_24_1","volume-title":"Authentication gap in TLS renegotiation","author":"Ray M.","year":"2009","unstructured":"M. Ray . Authentication gap in TLS renegotiation , 2009 . M. Ray. Authentication gap in TLS renegotiation, 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"February","author":"Rescorla E.","year":"2010","unstructured":"E. Rescorla , M. Ray , S. Dispensa , and N. Oskov . Transport Layer Security (TLS) Renegotiation Indication Extension. RFC 5746 (Proposed Standard) , February 2010 . E. Rescorla, M. Ray, S. Dispensa, and N. Oskov. Transport Layer Security (TLS) Renegotiation Indication Extension. RFC 5746 (Proposed Standard), February 2010."},{"key":"e_1_3_2_1_26_1","first-page":"2010","author":"Ristic I.","year":"2010","unstructured":"I. Ristic . Internet SSL Survey , Talk at BlackHat 2010 , 2010 . I. Ristic. Internet SSL Survey, Talk at BlackHat 2010, 2010.","journal-title":"BlackHat"},{"key":"e_1_3_2_1_27_1","volume-title":"May","author":"Salowey J.","year":"2006","unstructured":"J. Salowey , H. Zhou , P. Eronen , and H. Tschofenig . Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 4507 (Proposed Standard) , May 2006 . J. Salowey, H. Zhou, P. Eronen, and H. Tschofenig. Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 4507 (Proposed Standard), May 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_4"},{"key":"e_1_3_2_1_29_1","volume-title":"March","author":"Turner S.","year":"2011","unstructured":"S. Turner and T. Polk . Prohibiting Secure Sockets Layer (SSL) Version 2.0. RFC 6176 (Proposed Standard) , March 2011 . S. Turner and T. Polk. Prohibiting Secure Sockets Layer (SSL) Version 2.0. RFC 6176 (Proposed Standard), March 2011."},{"volume-title":"DigiNotar reports security incident","year":"2011","key":"e_1_3_2_1_30_1","unstructured":"Vasco. DigiNotar reports security incident , 2011 . Vasco. DigiNotar reports security incident, 2011."}],"event":{"name":"ACSAC '12: Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Orlando Florida USA","acronym":"ACSAC '12"},"container-title":["Proceedings of the 28th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2420953","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2420950.2420953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:56Z","timestamp":1750239236000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2420953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,3]]},"references-count":29,"alternative-id":["10.1145\/2420950.2420953","10.1145\/2420950"],"URL":"https:\/\/doi.org\/10.1145\/2420950.2420953","relation":{},"subject":[],"published":{"date-parts":[[2012,12,3]]},"assertion":[{"value":"2012-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}