Attack-Resilient TLS Certificate Transparency

被引:6
|
作者
Khan, Salabat [1 ]
Zhu, Liehuang [1 ]
Zhang, Zijian [1 ,2 ]
Rahim, Mussadiq Abdul [1 ]
Khan, Khalid [3 ]
Li, Meng [4 ,5 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100018, Peoples R China
[2] Univ Auckland, Dept Comp Sci, Auckland 1010, New Zealand
[3] Kohat Univ Sci & Technol, Kohat 26000, Pakistan
[4] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei 230601, Peoples R China
[5] Hefei Univ Technol, Minist Educ, Key Lab Knowledge Engn Big Data, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Servers; Proposals; Public key; Google; Authentication; TLS; PKI; log server; delegation of trust; collaborative identity verification; MODEL; PKI;
D O I
10.1109/ACCESS.2020.2996997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of Public-Key Infrastructure (PKI) for Internet-based communications has lately attracted researchers' attention because of Certification Authorities (CAs) crashes and consequent attacks. Google Certificate Transparency and subsequent log-based PKI proposals (e.g., AKI and ARPKI) have succeeded in making certificate-management processes more transparent, accountable, and verifiable. However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conformant certificate-issuance by them, and lack of rigorous authentication of domain ownership during certificate-issuance problems. This study presents Attack-Resilient TLS Certificate Transparency (ARCT) based on log servers to address these problems. ARCT enables root CA to enforce intermediate CAs to follow community standards through leveraging a log server at each root level. It also introduces a collaborative domain ownership verification method that deters false certificate-issuance and ensures that a set of CAs validates every certificate before any client will accept it. A certificate collectively approved by a set of CAs assures users that the certificate has been seen, and not instantly detected malicious, by a group of CAs. Finally, formal security and performance evaluations prove the reliability and effectiveness of ARCT.
引用
收藏
页码:98958 / 98973
页数:16
相关论文
共 50 条
  • [1] Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Sokolsky, Oleg
    Pappas, George J.
    Lee, Insup
    IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (02): : 66 - 81
  • [2] Attack-Resilient Sensor Fusion
    Ivanov, Radoslav
    Pajic, Miroslav
    Lee, Insup
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [3] Attack-Resilient Temperature Sensor Design
    Kajol, Mashrafi Alam
    Yu, Qiaoyan
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [4] Recaptured attack-resilient watermarking scheme
    Mehta, Preeti
    Singh, Mahesh K.
    Singha, Nitin
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [5] Robustness of Attack-resilient State Estimators
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Tabuada, Paulo
    Sokolsky, Oleg
    Lee, Insup
    Pappas, George J.
    2014 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2014, : 163 - 174
  • [6] An Attack-Resilient Architecture for the Internet of Things
    Almohri, Hussain M. J.
    Watson, Layne T.
    Evans, David
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (3940-3954) : 3940 - 3954
  • [7] An attack-resilient Grid auditing infrastructure
    Kunz, Christopher
    Wiebelitz, Jan
    Smith, Matthew
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 635 - 639
  • [8] Lightweight and Attack-resilient PUF for Internet of Things
    Rajan, Akshayhari
    Sankaran, Sriram
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 139 - 142
  • [9] An Attack-Resilient Channel Assignment MAC Protocol
    Zang, Wanyu
    Gu, Qijun
    Yu, Meng
    Liu, Peng
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 246 - +
  • [10] Towards Attack-Resilient Geometric Data Perturbation
    Chen, Keke
    Sun, Gordon
    Liu, Ling
    PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 78 - +