{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:41:35Z","timestamp":1765827695692,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC - Natural Sciences and Engineering Research Council of Canada"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196528","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"399-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["To Intercept or Not to Intercept"],"prefix":"10.1145","author":[{"given":"Louis","family":"Waked","sequence":"first","affiliation":[{"name":"Concordia Universiy, Montreal, PQ, Canada"}]},{"given":"Mohammad","family":"Mannan","sequence":"additional","affiliation":[{"name":"Concordia Universiy, Montreal, PQ, Canada"}]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, PQ, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"unstructured":"BEAST attack 1\/n-1 split patch. Available at https:\/\/goo.gl\/8MYeqz.  BEAST attack 1\/n-1 split patch. Available at https:\/\/goo.gl\/8MYeqz.","key":"e_1_3_2_1_1_1"},{"unstructured":"Cisco WSA AsyncOS documentation. Available at https:\/\/goo.gl\/hkHRbK.  Cisco WSA AsyncOS documentation. Available at https:\/\/goo.gl\/hkHRbK.","key":"e_1_3_2_1_2_1"},{"volume-title":"Sep","year":"2011","unstructured":"Diginotar ca breach. Available at https:\/\/goo.gl\/p9ainQ , Sep 2011 . Diginotar ca breach. Available at https:\/\/goo.gl\/p9ainQ, Sep 2011.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Apr","author":"NNIC","year":"2015","unstructured":"Distrusting new C NNIC certificates. Available at https:\/\/goo.gl\/yPidqC , Apr 2015 . Distrusting new CNNIC certificates. Available at https:\/\/goo.gl\/yPidqC, Apr 2015."},{"volume-title":"Oct","year":"2016","unstructured":"Distrusting new WoSign and StartCom certificates. Available at https:\/\/goo.gl\/ zGmf5b , Oct 2016 . Distrusting new WoSign and StartCom certificates. Available at https:\/\/goo.gl\/ zGmf5b, Oct 2016.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Aug","author":"TTPS","year":"2017","unstructured":"Effects of H TTPS and SSL inspection on the client. Available athttps:\/\/goo.gl\/ q1MVw4 , Aug 2017 . Effects of HTTPS and SSL inspection on the client. Available athttps:\/\/goo.gl\/ q1MVw4, Aug 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Oct","author":"OID.","year":"2013","unstructured":"Extended validation OID. Available at https:\/\/goo.gl\/AmmnXE , Oct 2013 . Extended validation OID. Available at https:\/\/goo.gl\/AmmnXE, Oct 2013."},{"unstructured":"GRC certificate validation revoked test note=Available at https:\/\/goo.gl\/A83vCC.  GRC certificate validation revoked test note=Available at https:\/\/goo.gl\/A83vCC.","key":"e_1_3_2_1_8_1"},{"unstructured":"Heartleech - GitHub. Available at https:\/\/goo.gl\/JeKcpt.  Heartleech - GitHub. Available at https:\/\/goo.gl\/JeKcpt.","key":"e_1_3_2_1_9_1"},{"unstructured":"Howsmyssl - GitHub. Available at https:\/\/goo.gl\/48gyGd.  Howsmyssl - GitHub. Available at https:\/\/goo.gl\/48gyGd.","key":"e_1_3_2_1_10_1"},{"volume-title":"Feb","year":"2015","unstructured":"Lenovo's superfish security. Available at https:\/\/goo.gl\/w2R2y5 , Feb 2015 . Lenovo's superfish security. Available at https:\/\/goo.gl\/w2R2y5, Feb 2015.","key":"e_1_3_2_1_11_1"},{"volume-title":"TMG 2010 updates.","unstructured":"Microsoft TMG 2010 updates. Available at https:\/\/goo.gl\/WcykM6. Microsoft TMG 2010 updates. Available at https:\/\/goo.gl\/WcykM6.","key":"e_1_3_2_1_12_1"},{"unstructured":"Microsoft TMG supported OS version. Available at https:\/\/goo.gl\/SU9LQ8.  Microsoft TMG supported OS version. Available at https:\/\/goo.gl\/SU9LQ8.","key":"e_1_3_2_1_13_1"},{"unstructured":"Microsoft trusted root certificate program. Available at https:\/\/goo.gl\/5BT7d8.  Microsoft trusted root certificate program. Available at https:\/\/goo.gl\/5BT7d8.","key":"e_1_3_2_1_14_1"},{"unstructured":"Mimikatz - GitHub. Available at https:\/\/goo.gl\/dUWCmH.  Mimikatz - GitHub. Available at https:\/\/goo.gl\/dUWCmH.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Dec","author":"NSSI","year":"2013","unstructured":"Revoking A NSSI CA. Available at https:\/\/goo.gl\/rCjwtY , Dec 2013 . Revoking ANSSI CA. Available at https:\/\/goo.gl\/rCjwtY, Dec 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Mar","author":"SSL","year":"2015","unstructured":"The risks of SSL inspection. Available athttps:\/\/goo.gl\/S3mL5v , Mar 2015 . The risks of SSL inspection. Available athttps:\/\/goo.gl\/S3mL5v, Mar 2015."},{"unstructured":"SSL client test. Available at https:\/\/goo.gl\/3RdQ1J.  SSL client test. Available at https:\/\/goo.gl\/3RdQ1J.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","volume-title":"Jan","author":"RUST","year":"2013","unstructured":"The T\u00dcRKT RUST SSL certificate fiasco. Available at https:\/\/goo.gl\/8gxCdc , Jan 2013 . The T\u00dcRKTRUST SSL certificate fiasco. Available at https:\/\/goo.gl\/8gxCdc, Jan 2013."},{"unstructured":"UFS - Linux Kernel archives. Available at https:\/\/goo.gl\/yZ3Fty.  UFS - Linux Kernel archives. Available at https:\/\/goo.gl\/yZ3Fty.","key":"e_1_3_2_1_20_1"},{"unstructured":"Untangle SSL inspector documentation. Available at https:\/\/goo.gl\/NZghGy.  Untangle SSL inspector documentation. Available at https:\/\/goo.gl\/NZghGy.","key":"e_1_3_2_1_21_1"},{"unstructured":"US-CERT alert on HTTPS interception. Available at https:\/\/goo.gl\/9oqZ4w.  US-CERT alert on HTTPS interception. Available at https:\/\/goo.gl\/9oqZ4w.","key":"e_1_3_2_1_22_1"},{"unstructured":"Volatility. Available at https:\/\/goo.gl\/LSnbwF.  Volatility. Available at https:\/\/goo.gl\/LSnbwF.","key":"e_1_3_2_1_23_1"},{"unstructured":"Windows cryptography API (CNG). Available at https:\/\/goo.gl\/UrARyq.  Windows cryptography API (CNG). Available at https:\/\/goo.gl\/UrARyq.","key":"e_1_3_2_1_24_1"},{"unstructured":"ZMap - GitHub. Available at https:\/\/goo.gl\/1g2UtU.  ZMap - GitHub. Available at https:\/\/goo.gl\/1g2UtU.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2810103.2813707"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/SP.2015.39"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/2976749.2978423"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/s00145-013-9162-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/SP.2014.15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/SP.2017.40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.14722\/ndss.2016.23374"},{"key":"e_1_3_2_1_34_1","volume-title":"The CRIME attack. Presentation at Ekoparty Security Conference","author":"Duong T.","year":"2012","unstructured":"T. Duong and J. Rizzo . The CRIME attack. Presentation at Ekoparty Security Conference , 2012 . T. Duong and J. Rizzo. The CRIME attack. Presentation at Ekoparty Security Conference, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.14722\/ndss.2017.23456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2382196.2382205"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/2382196.2382204"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1109\/SP.2015.38"},{"key":"e_1_3_2_1_39_1","volume-title":"May","author":"Housley R.","year":"2008","unstructured":"R. Housley , W. Ford , W. Polk , and D. Solo . RFC 5280: Internet x.509 public key infrastructure certificate and crl profile , May 2008 . R. Housley, W. Ford, W. Polk, and D. Solo. RFC 5280: Internet x.509 public key infrastructure certificate and crl profile, May 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/SP.2014.13"},{"key":"e_1_3_2_1_41_1","volume-title":"Black Hat Europe","author":"Jarmoc J.","year":"2012","unstructured":"J. Jarmoc . SSL\/TLS interception proxies and transitive trust . Black Hat Europe , Mar 2012 . J. Jarmoc. SSL\/TLS interception proxies and transitive trust. Black Hat Europe, Mar 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2987443.2987488"},{"key":"e_1_3_2_1_43_1","volume-title":"Feb","author":"Rescorla E.","year":"2010","unstructured":"E. Rescorla , M. Ray , S. Dispensa , and N. Oskov . RFC 5746: Transport layer security (tls) renegotiation indication extension , Feb 2010 . E. Rescorla, M. Ray, S. Dispensa, and N. Oskov. RFC 5746: Transport layer security (tls) renegotiation indication extension, Feb 2010."},{"key":"e_1_3_2_1_44_1","first-page":"131","volume-title":"Proceedings of the Eleventh Symposium On Usable Privacy and Security","author":"Ruoti S.","year":"2016","unstructured":"S. Ruoti , M. O'Neill , D. Zappala , and K. E. Seamons . User attitudes toward the inspection of encrypted traffic . In Proceedings of the Eleventh Symposium On Usable Privacy and Security , pages 131 -- 146 , Denver, CO, USA , 2016 . S. Ruoti, M. O'Neill, D. Zappala, and K. E. Seamons. User attitudes toward the inspection of encrypted traffic. In Proceedings of the Eleventh Symposium On Usable Privacy and Security, pages 131--146, Denver, CO, USA, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/SP.2017.46"},{"key":"e_1_3_2_1_46_1","first-page":"321","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Valenta L.","year":"2016","unstructured":"L. Valenta , S. Cohney , A. Liao , J. Fried , S. Bodduluri , and N. Heninger . Factoring as a service . In International Conference on Financial Cryptography and Data Security , pages 321 -- 338 , Christ Church, Barbados , 2016 . L. Valenta, S. Cohney, A. Liao, J. Fried, S. Bodduluri, and N. Heninger. Factoring as a service. In International Conference on Financial Cryptography and Data Security, pages 321--338, Christ Church, Barbados, 2016."},{"key":"e_1_3_2_1_47_1","volume-title":"The day DES died","author":"Van De Zande P.","year":"2001","unstructured":"P. Van De Zande . The day DES died . SANS Institute , Jul 2001 . P. Van De Zande. The day DES died. SANS Institute, Jul 2001."},{"key":"e_1_3_2_1_48_1","first-page":"97","volume-title":"USENIX Security Symposium","author":"Vanhoef M.","year":"2015","unstructured":"M. Vanhoef and F. Piessens . All your biases belong to us: Breaking RC4 in WPATKIP and TLS . In USENIX Security Symposium , pages 97 -- 112 , Washington D.C., USA , 2015 . M. Vanhoef and F. Piessens. All your biases belong to us: Breaking RC4 in WPATKIP and TLS. In USENIX Security Symposium, pages 97--112, Washington D.C., USA, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1007\/11426639_2"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '18","name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196528"}},"subtitle":["Analyzing TLS Interception in Network Appliances"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":48,"alternative-id":["10.1145\/3196494.3196528","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196528","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}