X.509 certificate error testing

David McLuskie, Xavier Bellekens

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Downloads (Pure)

Abstract

X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network. Combined both of these technologies provides the basis of the public key infrastructure (PKI). While the concept of PKI is a good idea, the different implementation of the technologies in different operating system and clients often lead to weaknesses. This paper proposes a methodology to automate the testing of SSL clients by generating both bogus and malformed certificates in order to evaluate the client’s response and identify potential threats to network infrastructures.
Original languageEnglish
Title of host publicationProceedings of the 13th International Conference on Availability, Reliability and Security
PublisherAssociation for Computing Machinery (ACM)
Number of pages8
ISBN (Print)9781450364485
DOIs
Publication statusPublished - 27 Aug 2018
Event13th International Conference on Availability, Reliability and Security (ARES 2018) - University of Hamburg, Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018
Conference number: 13
https://www.ares-conference.eu/

Conference

Conference13th International Conference on Availability, Reliability and Security (ARES 2018)
Abbreviated titleARES 2018
CountryGermany
CityHamburg
Period27/08/1830/08/18
Internet address

Fingerprint

Testing
Tunnels

Cite this

McLuskie, D., & Bellekens, X. (2018). X.509 certificate error testing. In Proceedings of the 13th International Conference on Availability, Reliability and Security [42] Association for Computing Machinery (ACM). https://doi.org/10.1145/3230833.3232820
McLuskie, David ; Bellekens, Xavier. / X.509 certificate error testing. Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM), 2018.
@inproceedings{8811d43e38074cd8817f80ecaf9d5fc4,
title = "X.509 certificate error testing",
abstract = "X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network. Combined both of these technologies provides the basis of the public key infrastructure (PKI). While the concept of PKI is a good idea, the different implementation of the technologies in different operating system and clients often lead to weaknesses. This paper proposes a methodology to automate the testing of SSL clients by generating both bogus and malformed certificates in order to evaluate the client’s response and identify potential threats to network infrastructures.",
author = "David McLuskie and Xavier Bellekens",
year = "2018",
month = "8",
day = "27",
doi = "10.1145/3230833.3232820",
language = "English",
isbn = "9781450364485",
booktitle = "Proceedings of the 13th International Conference on Availability, Reliability and Security",
publisher = "Association for Computing Machinery (ACM)",
address = "United States",

}

McLuskie, D & Bellekens, X 2018, X.509 certificate error testing. in Proceedings of the 13th International Conference on Availability, Reliability and Security., 42, Association for Computing Machinery (ACM), 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, 27/08/18. https://doi.org/10.1145/3230833.3232820

X.509 certificate error testing. / McLuskie, David; Bellekens, Xavier.

Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM), 2018. 42.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - X.509 certificate error testing

AU - McLuskie, David

AU - Bellekens, Xavier

PY - 2018/8/27

Y1 - 2018/8/27

N2 - X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network. Combined both of these technologies provides the basis of the public key infrastructure (PKI). While the concept of PKI is a good idea, the different implementation of the technologies in different operating system and clients often lead to weaknesses. This paper proposes a methodology to automate the testing of SSL clients by generating both bogus and malformed certificates in order to evaluate the client’s response and identify potential threats to network infrastructures.

AB - X.509 Certificates are used by a wide range of technologies to verify identities, while the SSL protocol is used to provide a secure encrypted tunnel through which data can be sent over a public network. Combined both of these technologies provides the basis of the public key infrastructure (PKI). While the concept of PKI is a good idea, the different implementation of the technologies in different operating system and clients often lead to weaknesses. This paper proposes a methodology to automate the testing of SSL clients by generating both bogus and malformed certificates in order to evaluate the client’s response and identify potential threats to network infrastructures.

U2 - 10.1145/3230833.3232820

DO - 10.1145/3230833.3232820

M3 - Conference contribution

SN - 9781450364485

BT - Proceedings of the 13th International Conference on Availability, Reliability and Security

PB - Association for Computing Machinery (ACM)

ER -

McLuskie D, Bellekens X. X.509 certificate error testing. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM). 2018. 42 https://doi.org/10.1145/3230833.3232820