{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:39:55Z","timestamp":1725615595301},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cns.2016.7860493","type":"proceedings-article","created":{"date-parts":[[2017,2,23]],"date-time":"2017-02-23T19:32:43Z","timestamp":1487878363000},"page":"261-269","source":"Crossref","is-referenced-by-count":4,"title":["Validating security protocols with cloud-based middleboxes"],"prefix":"10.1109","author":[{"given":"Curtis R.","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Craig A.","family":"Shue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ICC.2016.7511094"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/WiMOB.2015.7347956"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.17487\/rfc4322"},{"key":"ref32","first-page":"117","article-title":"The design and implementation of Open vSwitch","author":"pfaff","year":"2015","journal-title":"Networked Systems Design and Implementation (NSDI)"},{"year":"0","author":"neagle","journal-title":"Smart refrigerator hack exposes Gmail accountcredentials","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2674005.2674991"},{"year":"2013","author":"shin","journal-title":"NDSS","article-title":"Fresco: Modular composable security services for software-defined networks","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2377677.2377680"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.17487\/rfc4255"},{"year":"0","author":"roethlisberger","journal-title":"SSLsplit — transparent SSL\/TLS interception","key":"ref34"},{"year":"2014","journal-title":"OpenWRT wireless freedom","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/2663716.2663758"},{"year":"2012","author":"amann","journal-title":"Technical Report","article-title":"Revisiting SSL: A large-scale study of the Internet's most trusted protocol","key":"ref11"},{"key":"ref12","first-page":"5","article-title":"Weak authentication: How to authenticate unknown principals without trusted parties","author":"arkko","year":"2002","journal-title":"Security Protocols"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/SP.2014.15"},{"year":"0","author":"cortesi","journal-title":"mitmproxy","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-642-33167-1_12","article-title":"Trust no one else: Detecting MITM attacks against SSL\/TLS without third-parties","author":"dacosta","year":"2012","journal-title":"Computer Security-ESORICS 2012"},{"year":"2008","author":"dierks","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2 RFC 5246 (Proposed Standard)","key":"ref16"},{"year":"0","author":"dormann","journal-title":"Vulnerability note VU#720951 - OpenSSL TLS heartbeat extension read overflow discloses sensitive information","key":"ref17"},{"key":"ref18","first-page":"533","article-title":"Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags","author":"fayazbakhsh","year":"2014","journal-title":"Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation NSDI'14"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2486001.2486003"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2656877.2656882"},{"year":"0","journal-title":"The ICSI Certificate Notary","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/SP.2014.13"},{"year":"0","journal-title":"CRLSets — the chromium projects","key":"ref3"},{"year":"0","journal-title":"MITRE CVE — search results","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2815675.2815685"},{"year":"0","key":"ref5"},{"year":"0","journal-title":"Revoking intermediate certificates Introducing OneCRL","key":"ref8"},{"year":"0","key":"ref7"},{"year":"0","journal-title":"Barracuda web application firewall — client certificate validation using OCSP and CRLs","key":"ref2"},{"year":"0","journal-title":"Vulnerability note VU#656302 — Belkin Wemo home automation devices contain multiple vulnerabilities","key":"ref9"},{"year":"0","journal-title":"Alexa top 1 million domains","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/rfc5055"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2382196.2382204"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2534169.2491686"},{"key":"ref24","first-page":"519","article-title":"Vetting SSL usage in applications with SSLint","author":"he","year":"2015","journal-title":"Security and Privacy (SP)"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-319-30505-9_2","article-title":"Measuring the latency and pervasiveness of tls certificate revocation","author":"zhu","year":"2016","journal-title":"Passive and Active Measurement"},{"year":"0","author":"goodin","journal-title":"Man-in-the-middle attack on Vizio TVs coughs upowners' viewing habits","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2068816.2068856"},{"year":"2015","author":"holz","journal-title":"TLS in the wild an Internet-wide analysis of TLS-based protocols for electronic communication","key":"ref25"}],"event":{"name":"2016 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2016,10,17]]},"location":"Philadelphia, PA, USA","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7854080\/7860451\/07860493.pdf?arnumber=7860493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T21:17:03Z","timestamp":1568841423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7860493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/cns.2016.7860493","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}