liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Publications (4 of 4) Show all publications
Korzhitskii, N. & Carlsson, N. (2020). Characterizing the Root Landscape of Certificate Transparency Logs. In: Proceedings of the 19th International IFIP TC6 Networking Conference, IFIP Networking 2020, Paris, France, June 22-25: . Paper presented at 2020 IFIP Networking Conference (Networking) (pp. 190-198). IEEE
Open this publication in new window or tab >>Characterizing the Root Landscape of Certificate Transparency Logs
2020 (English)In: Proceedings of the 19th International IFIP TC6 Networking Conference, IFIP Networking 2020, Paris, France, June 22-25, IEEE, 2020, p. 190-198Conference paper, Published paper (Refereed)
Abstract [en]

Internet security and privacy stand on the trustworthiness of public certificates signed by Certificate Authorities (CAs). However, software products do not trust the same CAs and therefore maintain different root stores, each typically containing hundreds of trusted roots capable of issuing “trusted” certificates for any domain. Incidents with misissued certificates motivated Google to implement and enforce Certificate Transparency (CT). CT logs archive certificates in a public, auditable and append-only manner. The adoption of CT changed the trust landscape. As a part of this change, CT logs started to maintain their own root lists and log certificates that chain back to one of the trusted roots. In this paper, we present a first characterization of this emerging CT root store landscape, as well as the tool that we developed for data collection, visualization, and analysis of the root stores. As part of our characterization, we compare the logs’ root stores and quantify their changes with respect to both each other and the root stores of major software vendors, look at evolving vendor CT policies, and show that root store mismanagement may be linked to log misbehavior. Finally, we present and discuss the results of a survey that we have sent to the log operators participating in Apple’s and Google’s CT log programs.

Place, publisher, year, edition, pages
IEEE, 2020
Keywords
Networking, Internet architecture, cryptography, security, WebPKI, Certificate Transparency logs, roots
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:liu:diva-168819 (URN)000619498400022 ()978-3-903176-28-7 (ISBN)978-1-7281-6710-7 (ISBN)
Conference
2020 IFIP Networking Conference (Networking)
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Online demo and the datasets: https://nikita-kun.github.io/certificate-transparency-root-explorer/

Funding agencies: Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2020-09-01 Created: 2020-09-01 Last updated: 2021-04-26
Domova, V., Gärtner, E., Präntare, F., Pallin, M., Källström, J. & Korzhitskii, N. (2020). Improving Usability of Search and Rescue Decision Support Systems: WARA-PS Case Study. In: In proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA): . Paper presented at IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), September 8-11, 2020 (pp. 1251-1254). Vienna, Austria: IEEE conference proceedings
Open this publication in new window or tab >>Improving Usability of Search and Rescue Decision Support Systems: WARA-PS Case Study
Show others...
2020 (English)In: In proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria: IEEE conference proceedings, 2020, p. 1251-1254Conference paper, Published paper (Refereed)
Abstract [en]

Novel autonomous search and rescue systems, although powerful, still require a human decision-maker involvement. In this project, we focus on the human aspect of one such novel autonomous SAR system. Relying on the knowledge gained in a field study, as well as through the literature, we introduced several extensions to the system that allowed us to achieve a more user-centered interface. In the evaluation session with a rescue service specialist, we received positive feedback and defined potential directions for future work.

Place, publisher, year, edition, pages
Vienna, Austria: IEEE conference proceedings, 2020
Series
IEEE International Conference on Emerging Technologies and Factory Automation, ISSN 1946-0740, E-ISSN 1946-0759 ; 25
Keywords
Public Safety, Search and Rescue, Control System, User Interface
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-170328 (URN)10.1109/ETFA46521.2020.9211980 (DOI)000627406500186 ()9781728189574 (ISBN)9781728189567 (ISBN)
Conference
IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), September 8-11, 2020
Funder
Vinnova, 2017-04885Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

Funding: Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2020-10-09 Created: 2020-10-09 Last updated: 2023-04-03Bibliographically approved
Hasselquist, D., Lindström, C., Korzhitskii, N., Gurtov, A. & Carlsson, N. (2020). QUIC Throughput and Fairness over Dual Connectivity. In: Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS): . Paper presented at 28th International Symposium, MASCOTS 2020, Nice, France, November 17–19, 2020. Springer
Open this publication in new window or tab >>QUIC Throughput and Fairness over Dual Connectivity
Show others...
2020 (English)In: Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Springer, 2020Conference paper, Published paper (Refereed)
Abstract [en]

Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In this paper, we present the first such performance study. Using a series of throughput and fairness experiments, we show how QUIC is affected by different DC parameters, network conditions, and whether the DC implementation aims to improve throughput or reliability. Our findings provide insights into the impacts of splitting QUIC traffic in a DC environment. With reasonably selected DC parameters and increased UDP receive buffers, QUIC over DC performs similarly to TCP over DC and achieves optimal fairness under symmetric link conditions when DC is not used for packet duplication. 

Place, publisher, year, edition, pages
Springer, 2020
Keywords
QUIC Dual connectivity; Throughput; Fairness; Transport protocol; Multipath
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-179792 (URN)10.1007/978-3-030-68110-4_12 (DOI)2-s2.0-85101837098 (Scopus ID)9783030681098 (ISBN)9783030681104 (ISBN)
Conference
28th International Symposium, MASCOTS 2020, Nice, France, November 17–19, 2020
Funder
Swedish Research Council
Available from: 2021-10-01 Created: 2021-10-01 Last updated: 2023-04-03Bibliographically approved
Korzhitskii, N. (2018). Overview of the Secure Virtual Private LAN Service Testbed: Scientific Report for Short-Term Scientific Mission COST Action CA15127 RECODIS. Paper presented at COST Action CA15127 RECODIS (Resilient Communication Services Protecting End-user Applications from Disaster-based Failures). Resilient Communication Services Protecting End-user Applications from Disaster-based Failures (RECODIS)
Open this publication in new window or tab >>Overview of the Secure Virtual Private LAN Service Testbed: Scientific Report for Short-Term Scientific Mission COST Action CA15127 RECODIS
2018 (English)Report (Other academic)
Abstract [en]

During the mission to the University of Oulu a Host Identity Protocol network architecture that allows eavesdropping and man-in-the-middle (MITM) attacks has been deployed and studied. The testbed consisted of two enterprise level HIPSwitches, a Conductor, a few routers, MITM host and two endpoint hosts. Such architecture allowed to study orchestration and tunnel establishment processes between HIP nodes and implement a simple attack on an overlay network which shows that only edge-to-edge connection authenticity is being provided.

Place, publisher, year, edition, pages
Resilient Communication Services Protecting End-user Applications from Disaster-based Failures (RECODIS): , 2018
Keywords
Networking, VPLS, spoofing attack
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:liu:diva-169752 (URN)
Conference
COST Action CA15127 RECODIS (Resilient Communication Services Protecting End-user Applications from Disaster-based Failures)
Note

Funded by European Cooperation in Science and Technology.

Available from: 2020-09-18 Created: 2020-09-18 Last updated: 2022-10-10Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3347-8716

Search in DiVA

Show all publications