Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the...
Gespeichert in:
Veröffentlicht in: | Automatic control and computer sciences 2016, Vol.50 (8), p.743-748 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 748 |
---|---|
container_issue | 8 |
container_start_page | 743 |
container_title | Automatic control and computer sciences |
container_volume | 50 |
creator | Busygin, A. G. Konoplev, A. S. Kalinin, M. O. |
description | This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified. |
doi_str_mv | 10.3103/S0146411616080290 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1880778909</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1880778909</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</originalsourceid><addsrcrecordid>eNp1UEtLAzEQDqJgrf4AbwHPq5lkN5scS_EFBQ-t4G2ZZrPt9rFZk1Tw35u1HgTxNDN8j5n5CLkGdiuAibs5g1zmABIkU4xrdkJGUBQqA6beTslogLMBPycXIWwYS5iSI7Kf9L13aNY20Oho6qM1sXUddQ3Fvt-1Bocx0CUGW9MExLWli9n8m-uM21FcYduFSDFGNNtAD6HtVtTbD7dNCmN9bJvBxoZLctbgLtirnzomrw_3i-lTNnt5fJ5OZpkRIGPGS1GXKGTOVF6g1JI3xiBAgzXjEjnyWgEKkXNcltoqXSwNSsG1kOl7a8SY3Bx9043vBxtitXEH36WVFSjFylJpphMLjizjXQjeNlXv2z36zwpYNaRa_Uk1afhRExK3W1n_y_lf0RfnMnoE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1880778909</pqid></control><display><type>article</type><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><source>SpringerLink Journals</source><creator>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</creator><creatorcontrib>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</creatorcontrib><description>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</description><identifier>ISSN: 0146-4116</identifier><identifier>EISSN: 1558-108X</identifier><identifier>DOI: 10.3103/S0146411616080290</identifier><language>eng</language><publisher>New York: Allerton Press</publisher><subject>Certificates ; Computer Science ; Control Structures and Microprogramming ; Public Key Infrastructure</subject><ispartof>Automatic control and computer sciences, 2016, Vol.50 (8), p.743-748</ispartof><rights>Allerton Press, Inc. 2016</rights><rights>Copyright Springer Science & Business Media 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.3103/S0146411616080290$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.3103/S0146411616080290$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Busygin, A. G.</creatorcontrib><creatorcontrib>Konoplev, A. S.</creatorcontrib><creatorcontrib>Kalinin, M. O.</creatorcontrib><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><title>Automatic control and computer sciences</title><addtitle>Aut. Control Comp. Sci</addtitle><description>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</description><subject>Certificates</subject><subject>Computer Science</subject><subject>Control Structures and Microprogramming</subject><subject>Public Key Infrastructure</subject><issn>0146-4116</issn><issn>1558-108X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1UEtLAzEQDqJgrf4AbwHPq5lkN5scS_EFBQ-t4G2ZZrPt9rFZk1Tw35u1HgTxNDN8j5n5CLkGdiuAibs5g1zmABIkU4xrdkJGUBQqA6beTslogLMBPycXIWwYS5iSI7Kf9L13aNY20Oho6qM1sXUddQ3Fvt-1Bocx0CUGW9MExLWli9n8m-uM21FcYduFSDFGNNtAD6HtVtTbD7dNCmN9bJvBxoZLctbgLtirnzomrw_3i-lTNnt5fJ5OZpkRIGPGS1GXKGTOVF6g1JI3xiBAgzXjEjnyWgEKkXNcltoqXSwNSsG1kOl7a8SY3Bx9043vBxtitXEH36WVFSjFylJpphMLjizjXQjeNlXv2z36zwpYNaRa_Uk1afhRExK3W1n_y_lf0RfnMnoE</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Busygin, A. G.</creator><creator>Konoplev, A. S.</creator><creator>Kalinin, M. O.</creator><general>Allerton Press</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2016</creationdate><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><author>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Certificates</topic><topic>Computer Science</topic><topic>Control Structures and Microprogramming</topic><topic>Public Key Infrastructure</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Busygin, A. G.</creatorcontrib><creatorcontrib>Konoplev, A. S.</creatorcontrib><creatorcontrib>Kalinin, M. O.</creatorcontrib><collection>CrossRef</collection><jtitle>Automatic control and computer sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Busygin, A. G.</au><au>Konoplev, A. S.</au><au>Kalinin, M. O.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</atitle><jtitle>Automatic control and computer sciences</jtitle><stitle>Aut. Control Comp. Sci</stitle><date>2016</date><risdate>2016</risdate><volume>50</volume><issue>8</issue><spage>743</spage><epage>748</epage><pages>743-748</pages><issn>0146-4116</issn><eissn>1558-108X</eissn><abstract>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</abstract><cop>New York</cop><pub>Allerton Press</pub><doi>10.3103/S0146411616080290</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0146-4116 |
ispartof | Automatic control and computer sciences, 2016, Vol.50 (8), p.743-748 |
issn | 0146-4116 1558-108X |
language | eng |
recordid | cdi_proquest_journals_1880778909 |
source | SpringerLink Journals |
subjects | Certificates Computer Science Control Structures and Microprogramming Public Key Infrastructure |
title | Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T11%3A23%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Approaches%20to%20protection%20of%20applications%20based%20on%20the%20TLS%20protocol%20against%20attacks%20using%20revoked%20certificates&rft.jtitle=Automatic%20control%20and%20computer%20sciences&rft.au=Busygin,%20A.%20G.&rft.date=2016&rft.volume=50&rft.issue=8&rft.spage=743&rft.epage=748&rft.pages=743-748&rft.issn=0146-4116&rft.eissn=1558-108X&rft_id=info:doi/10.3103/S0146411616080290&rft_dat=%3Cproquest_cross%3E1880778909%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1880778909&rft_id=info:pmid/&rfr_iscdi=true |