{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:02Z","timestamp":1750220882623,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339277","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Does \"www.\" Mean Better Transport Layer Security?"],"prefix":"10.1145","author":[{"given":"Eman Salem","family":"Alashwali","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom, King Abdulaziz University (KAU), Jeddah, Saudi Arabia"}]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design (SUTD), Singapore, Singapore"}]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"volume-title":"Google Testing Removal of WWW Subdomain from Search Results. https:\/\/www.bleepingcomputer.com\/news\/google\/google-testing-removal-of-www-subdomain-from-search-results\/ Accessed","year":"2018","author":"Abrams Lawrence","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnology.2013.6579513"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37228-6_17"},{"key":"e_1_3_2_1_4_1","unstructured":"Alexa Internet Inc. 2018. Alexa Top Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip Accessed Dec. 11 2018.  Alexa Internet Inc. 2018. Alexa Top Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip Accessed Dec. 11 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131401"},{"volume-title":"Hide or Show Scheme and WWW Subdomains of URLs in Google Chrome Address Bar. https:\/\/www.tenforums.com\/tutorials\/117616-hide-show-www-subdomains-urls-address-bar-google-chrome.html Accessed","year":"2018","author":"Brink Shawn","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00053"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052698"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. https:\/\/tools.ietf.org\/html\/rfc5280#page-28 Accessed Dec. 28 2018.  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. https:\/\/tools.ietf.org\/html\/rfc5280#page-28 Accessed Dec. 28 2018.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"volume-title":"Transport Layer Security (TLS) Extensions: Extension Definitions. https:\/\/tools.ietf.org\/html\/rfc6066#page-6 Accessed","year":"2019","author":"D. Eastlake","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of USENIX Security Symposium. 1323--1338","year":"2017","author":"Felt Adrienne Porter","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"volume-title":"An Experimental Study of TLS Forward Secrecy Deployments. 18, 6","year":"2014","author":"Huang Lin-Shung","key":"e_1_3_2_1_15_1"},{"volume-title":"Incorrect Transforms When Stripping Subdomains. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=881410 Accessed","year":"2018","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298318"},{"volume-title":"Proceedings of Security and Privacy in Communication Networks (SecureComm). 489--509","year":"2017","author":"Li Xurong","key":"e_1_3_2_1_19_1"},{"volume-title":"Paul C Van Oorschot, and Scott A Vanstone","year":"1996","author":"Menezes Alfred J","key":"e_1_3_2_1_20_1"},{"volume-title":"Official: Google Chrome 69 Kills off the World Wide Web (in URLs). https:\/\/www.theregister.co.uk\/2018\/09\/07\/google_kills_www Accessed","year":"2018","author":"Nichols Shaun","key":"e_1_3_2_1_21_1"},{"volume-title":"https:\/\/www.openssl.org\/docs\/man1.1.1\/man3\/SSL_get_verify_result.html Accessed","year":"2018","author":"Software Foundation SSL","key":"e_1_3_2_1_22_1"},{"volume-title":"A Kenneth Reitz Project","year":"2019","author":"MMXVIX.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"volume-title":"Chrome 69 Kills Off www in URLs: Here's Why Google's Move Has Made People Angry. https:\/\/www.zdnet.com\/article\/chrome-69-kills-off-www-in-urls-heres-why-googles-move-has-made-people-angry Accessed","year":"2018","author":"Tung Liam","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715705"},{"volume-title":"Browser Statistics. https:\/\/www.w3schools.com\/browsers Accessed","year":"2019","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834102"},{"volume-title":"tls-scan. https:\/\/github.com\/prbinu\/tls-scan Accessed","year":"2018","author":"Yahoo Inc. 2016.","key":"e_1_3_2_1_30_1"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":30,"alternative-id":["10.1145\/3339252.3339277","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339277","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}