{"id":"https://openalex.org/W2027879103","doi":"https://doi.org/10.1109/mic.2010.21","title":"Why didn't we spot that? [Practical Security","display_name":"Why didn't we spot that? [Practical Security","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2027879103","doi":"https://doi.org/10.1109/mic.2010.21","mag":"2027879103"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2010.21","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112455182","display_name":"Stephen Farrell","orcid":null},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"S. Farrell","raw_affiliation_strings":["Trinity college Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"Trinity college Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5112455182"],"corresponding_institution_ids":["https://openalex.org/I205274468"],"apc_list":null,"apc_paid":null,"fwci":0.728,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.815264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":"14","issue":"1","first_page":"84","last_page":"87"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.7716824},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.6796737},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4454848},{"id":"https://openalex.org/keywords/scrutiny","display_name":"Scrutiny","score":0.4411912}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8128463},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.7716824},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7701938},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6796737},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.63773876},{"id":"https://openalex.org/C103613024","wikidata":"https://www.wikidata.org/wiki/Q230924","display_name":"Stateless protocol","level":3,"score":0.45235258},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4454848},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.44134215},{"id":"https://openalex.org/C2776050585","wikidata":"https://www.wikidata.org/wiki/Q7439360","display_name":"Scrutiny","level":2,"score":0.4411912},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37479496},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27432784},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.24259323},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.2085135},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17148802},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1135329},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2010.21","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1733713784","https://openalex.org/W1996736473","https://openalex.org/W2160838772","https://openalex.org/W2247093032","https://openalex.org/W2266218113","https://openalex.org/W3125672686","https://openalex.org/W4210531213"],"related_works":["https://openalex.org/W3165269102","https://openalex.org/W2215019170","https://openalex.org/W2183595201","https://openalex.org/W2157990153","https://openalex.org/W2148729745","https://openalex.org/W2096333427","https://openalex.org/W2070775894","https://openalex.org/W2046015955","https://openalex.org/W1568052786","https://openalex.org/W100665746"],"abstract_inverted_index":{"The":[0,132],"Secure":[1],"Sockets":[2],"Layer":[3,12],"(SSL)":[4],"protocol":[5,52,59,129],"and":[6,23,42,62,113],"its":[7],"standards-track":[8],"successor,":[9],"the":[10,30,50,58,64,67,95,98,128,145,156,169],"Transport":[11],"Security":[13],"(TLS)":[14],"protocol,":[15],"were":[16],"developed":[17],"more":[18,142],"than":[19],"a":[20,46,111,114,125],"decade":[21],"ago":[22],"have":[24,37],"generally":[25],"withstood":[26],"scrutiny":[27],"in":[28,49,90,138],"that":[29,53],"protocols":[31],"themselves":[32],"haven't":[33],"been":[34],"found":[35],"to":[36,61,83,100,127,174],"security":[38,119],"flaws.":[39],"Marsh":[40],"Ray":[41],"Steve":[43],"Dispensa":[44],"discovered":[45],"design":[47],"flaw":[48],"TLS":[51,87],"affects":[54],"all":[55],"versions":[56],"of":[57],"up":[60],"including":[63],"current":[65],"version.Whereas":[66],"vulnerability":[68,96,133],"itself":[69],"is":[70,130,134,144],"serious,":[71],"it":[72],"need":[73],"not":[74],"affect":[75],"many":[76],"deployments":[77],"once":[78],"administrators":[79],"apply":[80],"suitable":[81],"patches":[82],"disable":[84],"renegotiation,":[85],"leaving":[86],"sufficiently":[88],"secure":[89],"most":[91],"cases":[92],"because":[93,118],"exploiting":[94],"requires":[97],"attacker":[99],"be":[101],"an":[102,135],"active":[103],"man-in-themiddle,":[104],"redirecting":[105],"traffic":[106],"between":[107],"victims":[108],"(for":[109],"example,":[110],"browser":[112],"Web":[115],"server).":[116],"However,":[117],"problems":[120],"only":[121],"ever":[122],"get":[123],"worse,":[124],"change":[126],"required.":[131],"interesting":[136,143],"attack":[137],"itself,":[139],"but":[140],"perhaps":[141],"question,":[146],"why":[147],"didn't":[148],"we":[149],"see":[150],"this":[151,154,159],"earlier?":[152],"In":[153],"article,":[155],"author":[157],"explore":[158],"question":[160,170],"but,":[161],"unfortunately,":[162],"can't":[163],"answer":[164],"it.":[165],"Hopefully,":[166],"simply":[167],"asking":[168],"might":[171],"prompt":[172],"developers":[173],"re-examine":[175],"assumptions":[176],"they've":[177,179],"forgotten":[178],"even":[180],"made.":[181]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2027879103","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-07T12:25:00.696707","created_date":"2016-06-24"}