{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:24:08Z","timestamp":1755998648340,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Federal Ministry for Eco- nomic Affairs and Climate Action (BMWK)","award":["13I40V010A"],"award-info":[{"award-number":["13I40V010A"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3669935","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2288-9010","authenticated-orcid":false,"given":"Stefan","family":"Tatschner","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Germany and Electronic and Computer Engineering, University of Limerick, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6421-4023","authenticated-orcid":false,"given":"Sebastian N.","family":"Peters","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany and Technical University of Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1094-4828","authenticated-orcid":false,"given":"Michael P.","family":"Heinl","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany and Technical University of Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7615-7579","authenticated-orcid":false,"given":"Tobias","family":"Specht","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3375-8200","authenticated-orcid":false,"given":"Thomas","family":"Newe","sequence":"additional","affiliation":[{"name":"Electronic and Computer Engineering, University of Limerick, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"9594","article-title":"Information technology \u2014 Open systems interconnection \u2014 Part 8: The Directory: Public-key and attribute certificate frameworks","year":"2020","unstructured":"2020. Information technology \u2014 Open systems interconnection \u2014 Part 8: The Directory: Public-key and attribute certificate frameworks. ISO\/IEC 9594-8. https:\/\/www.iso.org\/standard\/80325.html","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_2_1","first-page":"8825","article-title":"Information technology \u2013 ASN.1 encoding rules \u2013 Part 1: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)","year":"2021","unstructured":"2021. Information technology \u2013 ASN.1 encoding rules \u2013 Part 1: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER). ISO\/IEC 8825-1.","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Sharon Boeyen Stefan Santesson Tim Polk Russ Housley Stephen Farrell and David Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598110"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358917"},{"volume-title":"Computer Safety, Reliability, and Security (Cham), J\u00e9r\u00e9mie Guiochet","author":"Heinl P.","key":"e_1_3_2_1_9_1","unstructured":"Michael\u00a0P. Heinl, Maximilian Pursche, Nikolai Puch, Sebastian\u00a0N. Peters, and Alexander Giehl. 2023. From Standard to Practice: Towards ISA\/IEC 62443-Conform Public Key Infrastructures. In Computer Safety, Reliability, and Security (Cham), J\u00e9r\u00e9mie Guiochet, Stefano Tonetta, and Friedemann Bitsch (Eds.). Springer Nature Switzerland, 196\u2013210."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2313"},{"key":"e_1_3_2_1_11_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Kaloper-Mer\u0161injak David","year":"2015","unstructured":"David Kaloper-Mer\u0161injak, Hannes Mehnert, Anil Madhavapeddy, and Peter Sewell. 2015. Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation. In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C.). USENIX Association, 223\u2013238. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/kaloper-mersinjak"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Thomas Pornin. 2013. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). RFC 6979. https:\/\/doi.org\/10.17487\/RFC6979","DOI":"10.17487\/RFC6979"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00036"},{"key":"e_1_3_2_1_15_1","unstructured":"Ole Tange. 2022. GNU Parallel. Zenodo. https:\/\/doi.org\/h10.5281\/zenodo.10558744"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605164"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00032"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3669935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:53:16Z","timestamp":1755881596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":17,"alternative-id":["10.1145\/3664476.3669935","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3669935","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}