Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatic control and computer sciences 2016, Vol.50 (8), p.743-748
Hauptverfasser: Busygin, A. G., Konoplev, A. S., Kalinin, M. O.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 748
container_issue 8
container_start_page 743
container_title Automatic control and computer sciences
container_volume 50
creator Busygin, A. G.
Konoplev, A. S.
Kalinin, M. O.
description This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.
doi_str_mv 10.3103/S0146411616080290
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1880778909</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1880778909</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</originalsourceid><addsrcrecordid>eNp1UEtLAzEQDqJgrf4AbwHPq5lkN5scS_EFBQ-t4G2ZZrPt9rFZk1Tw35u1HgTxNDN8j5n5CLkGdiuAibs5g1zmABIkU4xrdkJGUBQqA6beTslogLMBPycXIWwYS5iSI7Kf9L13aNY20Oho6qM1sXUddQ3Fvt-1Bocx0CUGW9MExLWli9n8m-uM21FcYduFSDFGNNtAD6HtVtTbD7dNCmN9bJvBxoZLctbgLtirnzomrw_3i-lTNnt5fJ5OZpkRIGPGS1GXKGTOVF6g1JI3xiBAgzXjEjnyWgEKkXNcltoqXSwNSsG1kOl7a8SY3Bx9043vBxtitXEH36WVFSjFylJpphMLjizjXQjeNlXv2z36zwpYNaRa_Uk1afhRExK3W1n_y_lf0RfnMnoE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1880778909</pqid></control><display><type>article</type><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><source>SpringerLink Journals</source><creator>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</creator><creatorcontrib>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</creatorcontrib><description>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</description><identifier>ISSN: 0146-4116</identifier><identifier>EISSN: 1558-108X</identifier><identifier>DOI: 10.3103/S0146411616080290</identifier><language>eng</language><publisher>New York: Allerton Press</publisher><subject>Certificates ; Computer Science ; Control Structures and Microprogramming ; Public Key Infrastructure</subject><ispartof>Automatic control and computer sciences, 2016, Vol.50 (8), p.743-748</ispartof><rights>Allerton Press, Inc. 2016</rights><rights>Copyright Springer Science &amp; Business Media 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.3103/S0146411616080290$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.3103/S0146411616080290$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Busygin, A. G.</creatorcontrib><creatorcontrib>Konoplev, A. S.</creatorcontrib><creatorcontrib>Kalinin, M. O.</creatorcontrib><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><title>Automatic control and computer sciences</title><addtitle>Aut. Control Comp. Sci</addtitle><description>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</description><subject>Certificates</subject><subject>Computer Science</subject><subject>Control Structures and Microprogramming</subject><subject>Public Key Infrastructure</subject><issn>0146-4116</issn><issn>1558-108X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp1UEtLAzEQDqJgrf4AbwHPq5lkN5scS_EFBQ-t4G2ZZrPt9rFZk1Tw35u1HgTxNDN8j5n5CLkGdiuAibs5g1zmABIkU4xrdkJGUBQqA6beTslogLMBPycXIWwYS5iSI7Kf9L13aNY20Oho6qM1sXUddQ3Fvt-1Bocx0CUGW9MExLWli9n8m-uM21FcYduFSDFGNNtAD6HtVtTbD7dNCmN9bJvBxoZLctbgLtirnzomrw_3i-lTNnt5fJ5OZpkRIGPGS1GXKGTOVF6g1JI3xiBAgzXjEjnyWgEKkXNcltoqXSwNSsG1kOl7a8SY3Bx9043vBxtitXEH36WVFSjFylJpphMLjizjXQjeNlXv2z36zwpYNaRa_Uk1afhRExK3W1n_y_lf0RfnMnoE</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>Busygin, A. G.</creator><creator>Konoplev, A. S.</creator><creator>Kalinin, M. O.</creator><general>Allerton Press</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>2016</creationdate><title>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</title><author>Busygin, A. G. ; Konoplev, A. S. ; Kalinin, M. O.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-273d7a3640845a6962fcca11fad026a2a2d81a3342ab79e895bca632936608ec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Certificates</topic><topic>Computer Science</topic><topic>Control Structures and Microprogramming</topic><topic>Public Key Infrastructure</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Busygin, A. G.</creatorcontrib><creatorcontrib>Konoplev, A. S.</creatorcontrib><creatorcontrib>Kalinin, M. O.</creatorcontrib><collection>CrossRef</collection><jtitle>Automatic control and computer sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Busygin, A. G.</au><au>Konoplev, A. S.</au><au>Kalinin, M. O.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates</atitle><jtitle>Automatic control and computer sciences</jtitle><stitle>Aut. Control Comp. Sci</stitle><date>2016</date><risdate>2016</risdate><volume>50</volume><issue>8</issue><spage>743</spage><epage>748</epage><pages>743-748</pages><issn>0146-4116</issn><eissn>1558-108X</eissn><abstract>This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.</abstract><cop>New York</cop><pub>Allerton Press</pub><doi>10.3103/S0146411616080290</doi><tpages>6</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0146-4116
ispartof Automatic control and computer sciences, 2016, Vol.50 (8), p.743-748
issn 0146-4116
1558-108X
language eng
recordid cdi_proquest_journals_1880778909
source SpringerLink Journals
subjects Certificates
Computer Science
Control Structures and Microprogramming
Public Key Infrastructure
title Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T11%3A23%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Approaches%20to%20protection%20of%20applications%20based%20on%20the%20TLS%20protocol%20against%20attacks%20using%20revoked%20certificates&rft.jtitle=Automatic%20control%20and%20computer%20sciences&rft.au=Busygin,%20A.%20G.&rft.date=2016&rft.volume=50&rft.issue=8&rft.spage=743&rft.epage=748&rft.pages=743-748&rft.issn=0146-4116&rft.eissn=1558-108X&rft_id=info:doi/10.3103/S0146411616080290&rft_dat=%3Cproquest_cross%3E1880778909%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1880778909&rft_id=info:pmid/&rfr_iscdi=true