Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2018
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances
ASIACCS '18: Proceedings of the 2018 on Asia Conference on Computer and Communications SecurityPages 399–412https://doi.org/10.1145/3196494.3196528Many enterprise-grade network appliances host a TLS proxy to facilitate interception of TLS-protected traffic for various purposes, including malware scanning, phishing detection, and preventing data exfiltration. When deployed, the TLS proxy acts as ...
- research-articleNovember 2017
On the Significance of Process Comprehension for Conducting Targeted ICS Attacks
CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCyPages 57–67https://doi.org/10.1145/3140241.3140254The exploitation of Industrial Control Systems (ICSs) has been described as both easy and impossible, where is the truth? PostStuxnet works have included a plethora of ICS focused cyber security research activities, with topics covering device maturity, ...
- short-paperNovember 2016
TLS Proxies: Friend or Foe?
IMC '16: Proceedings of the 2016 Internet Measurement ConferencePages 551–557https://doi.org/10.1145/2987443.2987488We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 TLS connections are TLS-proxied. The majority of these proxies appear to be ...