{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:25:29Z","timestamp":1765887929612,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134007","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1407-1420","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Where the Wild Warnings Are"],"prefix":"10.1145","author":[{"given":"Mustafa Emre","family":"Acer","sequence":"first","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Emily","family":"Stark","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Adrienne Porter","family":"Felt","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"given":"Radhika","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Bhanu","family":"Dev","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology, Hyderabad, Hyderabad, India"}]},{"given":"Matt","family":"Braithwaite","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Ryan","family":"Sleevi","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Parisa","family":"Tabriz","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488395"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Xavier de Carn\u00e9 de Carnavalet and Mohammad Mannan 2016. Killed by Proxy: Analyzing Client-end TLS Interception Software NDSS.","DOI":"10.14722\/ndss.2016.23374"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla 2008. The Transport Layer Security (TLS) Protocol Version 1.2. https:\/\/tools.ietf.org\/html\/rfc5246#section-7.4.2.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_2_5_1","volume-title":"The Security Impact of HTTPS Interception. In Network and Distributed Systems Symposium (NDSS'17)","author":"Durumeric Zakir","year":"2017","unstructured":"Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael Bailey, J Alex Halderman, and Vern Paxson 2017. The Security Impact of HTTPS Interception. In Network and Distributed Systems Symposium (NDSS'17)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590341"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"e_1_3_2_2_9_1","unstructured":"Lucas Garron and David Benjamin 2015. An update on SHA-1 certificates in Chrome. https:\/\/security.googleblog.com\/2015\/12\/an-update-on-sha-1-certificates-in.html."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.13"},{"key":"e_1_3_2_2_12_1","unstructured":"Mariko Kobayashi. 2017. Survey on Behaviors of Captive Portals. https:\/\/www.ietf.org\/proceedings\/98\/slides\/slides-98-capport-survey-00.pdf."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883039"},{"key":"e_1_3_2_2_14_1","volume-title":"Chromium Blog: Changes to the Field Trials Infrastructure. https:\/\/blog.chromium.org\/2012\/05\/changes-to-field-trials-infrastructure.html.","author":"Odean Tyler","year":"2012","unstructured":"Tyler Odean. 2012. Chromium Blog: Changes to the Field Trials Infrastructure. https:\/\/blog.chromium.org\/2012\/05\/changes-to-field-trials-infrastructure.html."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987488"},{"key":"e_1_3_2_2_16_1","volume-title":"Kaspersky: SSL interception differentiates certificates with a 32bit hash. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=978.","author":"Ormandy Tavis","year":"2016","unstructured":"Tavis Ormandy. 2016. Kaspersky: SSL interception differentiates certificates with a 32bit hash. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=978."},{"key":"e_1_3_2_2_17_1","unstructured":"Waseem Patwegar. 2016. How to Fix Slow or Incorrect Windows Computer Clock. http:\/\/www.techbout.com\/fix-slow-incorrect-windows-computer-clock-14287\/."},{"key":"e_1_3_2_2_18_1","unstructured":"Deborah Salmi. 2015. Avast Web Shield scans HTTPS sites for malware and threats. https:\/\/blog.avast.com\/2015\/05\/25\/explaining-avasts-https-scanning-feature\/."},{"key":"e_1_3_2_2_19_1","volume-title":"Scaring and Bullying People into Security Won't Work","author":"Sasse Angela","year":"2015","unstructured":"Angela Sasse. 2015. Scaring and Bullying People into Security Won't Work. IEEE Security and Privacy (May\/June 2015)."},{"key":"e_1_3_2_2_20_1","volume-title":"Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy & Marketing","author":"Stewart David W","year":"1994","unstructured":"David W Stewart and Ingrid M Martin 1994. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy & Marketing (1994), 1--19."},{"key":"e_1_3_2_2_21_1","volume-title":"A Week to Remember: The Impact of Browser Warning Storage Policies Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Weinberger Joel","year":"2016","unstructured":"Joel Weinberger and Adrienne Porter Felt 2016. A Week to Remember: The Impact of Browser Warning Storage Policies Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 15--25. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/weinberger"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"M Wogalter. 2006. Purposes and scope of warnings. Handbook of Warnings (3--9); Wogalter M. Ed (2006).","DOI":"10.1201\/9780849375477.ch281"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134007"}},"subtitle":["Root Causes of Chrome HTTPS Certificate Errors"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":22,"alternative-id":["10.1145\/3133956.3134007","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134007","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}