{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:28:44Z","timestamp":1773772124221,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["MURI W911NF-09-1-0553"],"award-info":[{"award-number":["MURI W911NF-09-1-0553"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001655","name":"German Academic Exchange Service","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007523","name":"Advanced Cyberinfrastructure","doi-asserted-by":"publisher","award":["ACI-1032889"],"award-info":[{"award-number":["ACI-1032889"]}],"id":[{"id":"10.13039\/100007523","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["MURI W911NF-09-1-0553"],"award-info":[{"award-number":["MURI W911NF-09-1-0553"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523665","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"179-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["No attack necessary"],"prefix":"10.1145","author":[{"given":"Johanna","family":"Amann","sequence":"first","affiliation":[{"name":"International Computer Science Institute"}]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[{"name":"International Computer Science Institute and Lawrence Berkeley National Laboratory"}]},{"given":"Matthias","family":"Vallentin","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Seth","family":"Hall","sequence":"additional","affiliation":[{"name":"International Computer Science Institute"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Convergence. http:\/\/www.convergence.io.  Convergence. http:\/\/www.convergence.io."},{"key":"e_1_3_2_1_2_1","unstructured":"Akhawe D. Amann B. Vallentin M. and Sommer R. Here's My Cert So Trust Me Maybe? Understanding TLS Errors on the Web.  Akhawe D. Amann B. Vallentin M. and Sommer R. Here's My Cert So Trust Me Maybe? Understanding TLS Errors on the Web."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319710"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655012"},{"key":"e_1_3_2_1_6_1","unstructured":"Bro NSM. http:\/\/www.bro.org.  Bro NSM. http:\/\/www.bro.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Certificate Patrol. http:\/\/patrol.psyced.org\/.  Certificate Patrol. http:\/\/patrol.psyced.org\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"e_1_3_2_1_9_1","unstructured":"Comodo Report of Incident on 15-MAR-2011. http:\/\/comodo.com\/Comodo-Fraud-Incident-20103-23.html.  Comodo Report of Incident on 15-MAR-2011. http:\/\/comodo.com\/Comodo-Fraud-Incident-20103-23.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_11_1","unstructured":"EFF. SSL Observatory. https:\/\/www.eff.org\/observatory.  EFF. SSL Observatory. https:\/\/www.eff.org\/observatory."},{"key":"e_1_3_2_1_12_1","volume-title":"IETF Internet-Draft","author":"Evans C.","year":"2011"},{"key":"e_1_3_2_1_13_1","volume-title":"How is SSL hopelessly broken? Let us count the ways","author":"Goodin D.","year":"2011"},{"key":"e_1_3_2_1_14_1","volume-title":"IETF Internet-Draft","author":"Hallam-Baker P.","year":"2011"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security","author":"Heninger N.","year":"2012"},{"key":"e_1_3_2_1_16_1","volume-title":"HTTP Strict Transport Security (HSTS). RFC","author":"Hodges J.","year":"2012"},{"key":"e_1_3_2_1_17_1","volume-title":"The DNS-Based Authentication of Named Entities (DANE): TLS Protocol. RFC","author":"Hoffman P.","year":"2012"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785594.1785633"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_22"},{"key":"e_1_3_2_1_22_1","volume-title":"Nov.","author":"Langley A.","year":"2011"},{"key":"e_1_3_2_1_23_1","volume-title":"May","author":"Langley A.","year":"2011"},{"key":"e_1_3_2_1_24_1","volume-title":"Jan.","author":"Langley A.","year":"2013"},{"key":"e_1_3_2_1_25_1","volume-title":"Black Hat USA Talk","author":"Marlinspike M.","year":"2009"},{"key":"e_1_3_2_1_26_1","volume-title":"IETF Internet-Draft","author":"Marlinspike M.","year":"2013"},{"key":"e_1_3_2_1_27_1","volume-title":"Harvesting SSL Certificate Data to Mitigate Web-Fraud. CoRR abs\/0909.3688","author":"Mishari M. A.","year":"2009"},{"key":"e_1_3_2_1_28_1","unstructured":"Mozilla Bug 369357 -- Add DigiNotar EV Root CA Certificates 2012. https:\/\/bugzil.la\/369357.  Mozilla Bug 369357 -- Add DigiNotar EV Root CA Certificates 2012. https:\/\/bugzil.la\/369357."},{"key":"e_1_3_2_1_29_1","unstructured":"Mozilla Bug 433845 -- Add T\u00dcRKTRUST Root CA 2012. https:\/\/bugzil.la\/433845.  Mozilla Bug 433845 -- Add T\u00dcRKTRUST Root CA 2012. https:\/\/bugzil.la\/433845."},{"key":"e_1_3_2_1_30_1","unstructured":"Mozilla Bug 724929 -- Improper Character Escaping and Unescaping in alg1485.c & secname.c 2012. https:\/\/bugzil.la\/480509.  Mozilla Bug 724929 -- Improper Character Escaping and Unescaping in alg1485.c & secname.c 2012. https:\/\/bugzil.la\/480509."},{"key":"e_1_3_2_1_31_1","unstructured":"Mozilla Bug 724929 -- Remove Trustwave Certificate(s) from Trusted Root Certificates 2012. https:\/\/bugzil.la\/724929.  Mozilla Bug 724929 -- Remove Trustwave Certificate(s) from Trusted Root Certificates 2012. https:\/\/bugzil.la\/724929."},{"key":"e_1_3_2_1_32_1","unstructured":"Nightingale J. Mozilla Security Blog: DigiNotar Removal Follow Up. http:\/\/blog.mozilla.org\/security\/2011\/09.  Nightingale J. Mozilla Security Blog: DigiNotar Removal Follow Up. http:\/\/blog.mozilla.org\/security\/2011\/09."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_34_1","volume-title":"Fox-IT","author":"Prins J. R.","year":"2012"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_27"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_20"},{"key":"e_1_3_2_1_37_1","volume-title":"Dec.","author":"Sotirov A.","year":"2008"},{"key":"e_1_3_2_1_38_1","volume-title":"Black Hat USA Talk","author":"Sotirov A.","year":"2009"},{"key":"e_1_3_2_1_39_1","volume-title":"WEIS","author":"Vratonjic N.","year":"2011"},{"key":"e_1_3_2_1_40_1","volume-title":"Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing. In USENIX Annual Technical Conference","author":"Wendlandt D.","year":"2008"},{"key":"e_1_3_2_1_41_1","volume-title":"Criminal Charges are not pursued: Hacking PKI. DEFCON 17 Talk","author":"Zusman M.","year":"2009"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523665"}},"subtitle":["the surprising dynamics of SSL trust relationships"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":40,"alternative-id":["10.1145\/2523649.2523665","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523665","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}