liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Toward Secure and Privacy-Preserving Communication over Non-Trusted Networks
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-7631-0625
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The widespread adoption of encrypted communication protocols has improved digital privacy. However, even if the content is encrypted, an attacker can exploit metadata and patterns in network traffic to infer a user’s activity and behavior. Meanwhile, as users increasingly rely on third-party infrastructure, cloud-based applications face privacy challenges during data processing, exposing sensitive information. In parallel, long-term communication security depends on proper certificate management, where misconfigurations or evolving practices can compromise security. This thesis explores these multifaceted challenges and presents solutions to preserve privacy in adversarial and non-trusted environments.

First, the thesis focuses on encrypted traffic analysis, particularly fingerprinting at-tacks that exploit observable metadata such as packet sizes, transmission timing, and traffic flow patterns to infer sensitive user information and identify user activities. The work explores these attacks across multiple platforms and use cases, demonstrating their real-world feasibility and high accuracy. To counteract these threats, several mitigation strategies are systematically evaluated, including packet padding, timing obfuscation, and traffic shaping, each assessed for its tradeoffs between effectiveness, impact on network performance, and users’ quality of experience.

Second, the thesis studies secure data computation in cloud environments using homomorphic encryption (HE), a cryptographic technique that enables computation directly on encrypted data without requiring prior decryption. While HE offers a strong theoretical foundation, its practical application has long been hindered by performance overhead and integration complexity. This thesis explores the real-world applicability of HE by designing diverse systems, comparing schemes, and proposing efficiency optimizations. The findings highlight the potential and current limitations of HE, offering valuable guidance for its adoption in cloud-based systems.

Third, the thesis examines long-term authentication security through a 10-year longitudinal analysis of certificate usage in the web public key infrastructure. While certificates are essential for encrypted communication, inconsistent issuance, renewal, and management can introduce systemic vulnerabilities. The analysis of wildcard and multi-domain certificates, as well as certificate chain evolution, reveals key trends, including declining use of wildcard certificates, shifting practices among certificate authorities, and simpler chain structures. These patterns highlight evolving industry behaviors and persistent challenges in certificate lifecycle management.

Combined, this thesis contributes to a better understanding of the evolving security and privacy landscape in digitally connected systems. By contributing to three distinct but interrelated domains, the thesis highlights the complexity of modern privacy challenges and offers targeted strategies to strengthen digital confidentiality. Through systematic evaluations, novel designs, and long-term measurements, the work advances state-of-the-art privacy-preserving communication and provides practical insights for building a more resilient and trustworthy digital infrastructure.

Abstract [sv]

I dagens digitala värld används kryptering i allt större utsträckning för att skydda vår kommunikation och stärka den digitala integriteten. Men även om innehållet är krypterat kan en angripare utnyttja metadata och mönster i nätverkstrafik för att dra slutsatser om en användares aktivitet och beteenden. Samtidigt har användningen av molntjänster ökat kraftigt, vilket ställer höga krav på att databehandlingen sker på säkert sätt då känslig information ofta behandlas på tredjepartsinfrastruktur. Dessutom är långsiktig säkerhet i digital kommunikation beroende av korrekt hantering av digitala certifikat, där felkonfigurationer eller föråldrade metoder kan skapa säkerhetsluckor. Den här avhandlingen undersöker dessa komplexa och sam-manlänkade utmaningar samt presenterar lösningar för att skydda integriteten i miljöer där nätverk eller tjänsteleverantörer inte kan betraktas som tillförlitliga.

Först studeras hur angripare kan utföra trafikanalysattacker på krypterad nätverks-trafik genom att analysera metadata, till exempel paketstorlekar, tidsintervaller och trafikflöden. Med mönsteranalys blir det möjligt att med hög noggrannhet fastställa en användares aktivitet, även när innehållet är krypterat. Avhandlingen utforskar dessa attacker i olika områden och demonstrerar dess praktiska genomförbarhet. För att motverka attackerna utvärderas även olika skyddsåtgärder, som att skicka med extra data, fördröja sändningar eller forma om trafiken, alla som medför olika avvägningar mellan skyddsnivå, nätverksprestanda och användarupplevelse.

Avhandlingen studerar även säker databehandling i molnet med hjälp av homomorfisk kryptering, en kryptografisk teknik som möjliggör beräkningar direkt på krypterad data utan att den först behöver dekrypteras. Detta innebär att molntjänster kan behandla information utan att behöva ha tillgång till den i klartext. Trots att tekniken är lovande, har dess praktiska tillämpning försvårats av stora utmaningar i form av höga prestandakrav och komplex integrering. Avhandlingen undersöker teknikens tillämpbarhet genom olika systemdesign och algoritmjämförelser, vilket belyser både potential och begränsningar samt ger insikter för praktisk användning.

Slutligen analyseras hur det digitala certifikatsystemet, som utgör grunden för säker autentisering på webben, har utvecklats under de senaste tio åren. Genom omfattande dataanalys identifieras förändrade mönster i hur certifikat utfärdas, förnyas och hanteras. Resultaten visar på både positiva förändringar och kvarstående utmaningar, samt betonar behovet av tydligare riktlinjer och förbättrade rutiner för att långsiktigt stärka tilliten till den digitala infrastrukturen.

Sammanfattningsvis bidrar avhandlingen till en fördjupad förståelse av säkerhet och integritet i digitala kommunikationssystem. Genom systematiska analyser, praktiska experiment och långsiktiga mätningar presenteras lösningar som gör dagens och morgondagens digitala infrastruktur mer robust och tillförlitlig.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2025. , p. 103
Series
Linköping Studies in Science and Technology. Dissertations, ISSN 0345-7524 ; 2461
National Category
Security, Privacy and Cryptography
Identifiers
URN: urn:nbn:se:liu:diva-217111DOI: 10.3384/9789181181838ISBN: 9789181181821 (print)ISBN: 9789181181838 (electronic)OAI: oai:DiVA.org:liu-217111DiVA, id: diva2:1993732
Public defence
2025-10-03, Ada lovelace, B-building, Campus Valla, Linköping, 09:15 (English)
Opponent
Supervisors
Note

Funding: This work was partially supported by the Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation.

2025-09-18: Updated to a smaller file size.

Available from: 2025-09-01 Created: 2025-09-01 Last updated: 2025-09-18Bibliographically approved
List of papers
1. Lightweight Fingerprint Attack and Encrypted Traffic Analysis on News Articles
Open this publication in new window or tab >>Lightweight Fingerprint Attack and Encrypted Traffic Analysis on News Articles
2022 (English)In: 2022 IFIP Networking Conference (IFIP Networking), IEEE , 2022Conference paper, Published paper (Refereed)
Abstract [en]

The news articles we read online can reveal a lot about us. Privacy aware groups have therefore long pushed for the use of HTTPS (encrypted end-to-end communication). In this paper, we present the design and evaluation of a lightweight framework that can (1) successfully identify individual news articles even when the articles are delivered over encrypted connections, and (2) separate between articles associated with different news websites even when the websites are delivered over the same infrastructure. Our results demonstrate that naive use of HTTPS is not enough to prevent attackers monitoring a user's connections from identifying articles that the user reads on the most popular news website. We also provide insights into what makes some websites more/less resilient to our attack, and we use Twitter data to evaluate the effectiveness of an example attack that in addition incorporates the popularity of individual news articles. We are the first to demonstrate and evaluate the practical effectiveness of this type of attack when applied on modern news websites, and our multi-website-based evaluation provides valuable insights into how websites can best protect themselves against this type of attacks. These insights are important for websites that want to help protect the privacy of their users.

Place, publisher, year, edition, pages
IEEE, 2022
Keywords
Fingerprinting attack; Encrypted traffic analysis; News articles identification
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-188887 (URN)10.23919/IFIPNetworking55013.2022.9829796 (DOI)000855528800035 ()9783903176485 (ISBN)
Conference
IFIP Networking Conference (IFIP Networking), Catania, ITALY, jun 13-16, 2022
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Note

This paper won the best paper award at the conference.

Funding: Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2022-09-29 Created: 2022-09-29 Last updated: 2025-09-01Bibliographically approved
2. Twitch Chat Fingerprinting
Open this publication in new window or tab >>Twitch Chat Fingerprinting
2022 (English)In: Proc. IFIP Network Traffic Measurement and Analysis Conference (TMA) 2022, 2022Conference paper, Published paper (Refereed)
Abstract [en]

The streaming content that we choose to watch canreveal much about our thoughts, opinions, and interests. Anadversary capable of determining what users watch thereforepresents a significant privacy threat. In this paper, we presentand evaluate the first fingerprinting attack on Twitch that allowsviewers of individual live streams to be identified despite thetraffic being encrypted. The attack targets the traffic patternsassociated with chat messages associated with each stream. Ourresults show that high accuracy can be achieved by eavesdroppingonly for a short time (e.g., 90 seconds) and that the accuracy canbe increased even further by interacting with the stream. We alsotake a closer look at how the accuracy and activity level differbetween different Twitch channels and provide insights into theaccuracy that attackers using different strategies for selectingtarget channels may have. Finally, we study countermeasures toprotect against such attacks and demonstrate that the naive use ofVPN is not enough. We instead present countermeasures alteringpacket timing and sizes. Our large-scale evaluation of differentcountermeasures provides important insights that help both thestreaming providers and users better protect their privacy.

National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-188886 (URN)
Conference
IFIP Network Traffic Measurement and Analysis Conference (TMA), Enschede, The Netherlands, June 2022.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2022-09-29 Created: 2022-09-29 Last updated: 2025-09-01
3. Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic
Open this publication in new window or tab >>Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic
Show others...
2024 (English)In: Proceedings on Privacy Enhancing Technologies, 2024, Vol. 2024, no 4, p. 167-184Conference paper, Published paper (Other academic)
Abstract [en]

Despite the clear dominance of video streaming traffic on the Internet and the significant ramifications of disclosure of which videos users are streaming, video fingerprinting has received relatively little attention compared to other traffic analysis domains. Existing attacks are tailored to undefended traffic and mostly rely on a few manually crafted features. Meanwhile, potential defenses are ad hoc, often impractical, and typically only mentioned briefly. Drawing from progress made on website fingerprinting, we aim to improve current standards for attacks and defenses for video streaming traffic while highlighting a critical and underexplored issue on today's Internet. We show that directional and timing-based attacks that leverage CNNs are competitive with state-of-the-art video fingerprinting attacks, in many cases with far less training data. We also provide the first extensive study of potential defenses, which considers performance against attacks, overheads, and user QoE; and we present a novel defense design that boasts both broader applicability and greater efficacy than existing proposals.

Keywords
Video fingerprinting, Traffic analysis, Defenses, Attacks
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208862 (URN)10.56553/popets-2024-0112 (DOI)
Conference
Privacy Enhancing Technologies Symposium (PETS), July 2024.
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-10-27 Created: 2024-10-27 Last updated: 2025-09-01Bibliographically approved
4. Understanding and Improving Video Fingerprinting Attack Accuracy under Challenging Conditions
Open this publication in new window or tab >>Understanding and Improving Video Fingerprinting Attack Accuracy under Challenging Conditions
Show others...
2024 (English)In: PROCEEDINGS OF THE 23RD WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2024, ASSOC COMPUTING MACHINERY , 2024, p. 141-154Conference paper, Published paper (Refereed)
Abstract [en]

The threat of video fingerprinting attacks poses significant privacy concerns. These attacks can identify streamed videos with high accuracy despite the use of encryption, leveraging both heuristic-based and deep learning techniques. However, the real-world effectiveness of such attacks remains underexplored, as most research assumes ideal conditions. In this paper, we address the challenges posed by variable network conditions and live-streaming latency, which complicate the attacker's ability to collect useful training data. First, we evaluate several deep learning model architectures against video data under diverse network conditions, including two adaptations of existing website fingerprinting attacks tailored to video that we show boast notable improvements over the base attacks and previous state-of-the-art video fingerprinting attacks. Second, we introduce two augmentation techniques and demonstrate that they substantially enhance attack performance in suboptimal conditions, without knowledge of the victim's live latency. Finally, we analyze the effects of data limitations such as observation time, dataset size, and training time. Overall, our work provides new insights into the impact that several real-world challenges have on attack accuracy, presents new and improved attacks, and details two augmentation techniques that can further boost the performance of the new attacks. Combined, these significant advancements highlight the urgent need for effective defense mechanisms.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2024
Keywords
traffic analysis; video fingerprinting; challenging conditions
National Category
Other Engineering and Technologies
Identifiers
urn:nbn:se:liu:diva-212753 (URN)10.1145/3689943.3695045 (DOI)001434853500011 ()2-s2.0-85214235108 (Scopus ID)9798400712395 (ISBN)
Conference
23rd Workshop on Privacy in the Electronic Society, Salt Lake City, UT, oct 14-18, 2024
Note

Funding Agencies|Swedish Foundation for Strategic Research (SSF); Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2025-04-02 Created: 2025-04-02 Last updated: 2025-09-01
5. PET-Exchange: A Privacy Enhanced Trading Exchange using Homomorphic Encryption
Open this publication in new window or tab >>PET-Exchange: A Privacy Enhanced Trading Exchange using Homomorphic Encryption
2023 (English)In: 2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, IEEE , 2023, p. 168-179Conference paper, Published paper (Refereed)
Abstract [en]

The underlying trading mechanisms of electronic securities exchanges have mostly stayed the same over the years with some additions and improvements. However, over the recent decade, high-frequency traders using algorithmic trading have shifted the field using practices that many consider unfair or unethical. In addition, insider trading continues to cause trust issues on certain trading platforms. In this paper, we present PET-Exchange, a privacy-preserving framework for trading securities on an electronic stock exchange. By using homomorphic encryption, PET-Exchange prevents information disclosures and unfair advantages in the trading processes. By matching and trading encrypted orders, we study the performance under various volumes and timing constraints, and compare this to the unencrypted counterparts. Our analysis of PET-Exchange using market trade data shows the privacy and cryptographic tradeoffs, demonstrating it to be suitable for small-scale trading and privacy-preserving auctions. Finally, we discuss the potential impact on transparency, fairness, and opportunities for financial crime in an electronic securities exchange. The insights we provide take us one step closer to a privacy-aware and fair public securities exchange.

Place, publisher, year, edition, pages
IEEE, 2023
Series
Annual Conference on Privacy Security and Trust-PST, ISSN 1712-364X
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:liu:diva-200109 (URN)10.1109/PST58708.2023.10320190 (DOI)001108746000021 ()9798350313871 (ISBN)9798350313888 (ISBN)
Conference
20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, DENMARK, aug 21-23, 2023
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2024-01-15 Created: 2024-01-15 Last updated: 2025-09-01
6. Now is the Time: Scalable and Cloud-supported Audio Conferencing using End-to-End Homomorphic Encryption
Open this publication in new window or tab >>Now is the Time: Scalable and Cloud-supported Audio Conferencing using End-to-End Homomorphic Encryption
2023 (English)In: PROCEEDINGS OF THE 2023 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2023, ASSOC COMPUTING MACHINERY , 2023, p. 41-53Conference paper, Published paper (Refereed)
Abstract [en]

Homomorphic encryption (HE) allows computations on encrypted data, leaking neither the input nor the computational output. While the method has historically been infeasible to use in practice, due to recent advancements, HE has started to be applied in real-world applications. Motivated by the possibility of outsourcing heavy computations to the cloud and still maintaining end-to-end security, in this paper, we use HE to design a basic audio conferencing application and demonstrate that our design approach (including some advanced features) is both practical and scalable. First, by homomorphically mixing encrypted audio in an untrusted, honest-but-curious server, we demonstrate the practical use of HE in audio communication. Second, by using multiplication operations, we go beyond the purely additive audio mixing and implement advanced example features capable of handling server-side mute and breakout rooms without the cloud server being able to extract sensitive user-specific metadata. Whereas the encryption and decryption times are shown to be magnitudes slower than generic AES encryption and roughly ten times slower than Signal's AES implementation, our solution approach is scalable and achieves end-to-end encryption while keeping performance well within the bounds of practical use. Third, besides studying the performance aspects, we also objectively evaluate the perceived audio quality, demonstrating that this approach also achieves excellent audio quality. Finally, our comprehensive evaluation and empirical findings provide valuable insights into the tradeoffs between HE schemes, their security configurations, and audio parameters. Combined, our results demonstrate that audio mixing using HE (including advanced features) now can be made both practical and scalable.

Place, publisher, year, edition, pages
ASSOC COMPUTING MACHINERY, 2023
Keywords
Audio Conferencing; Privacy; End-to-End Encryption; Homomorphic Encryption; Secure Computation; Cloud Computing
National Category
Computer Engineering
Identifiers
urn:nbn:se:liu:diva-200296 (URN)10.1145/3605763.3625245 (DOI)001125540600005 ()9798400702594 (ISBN)
Conference
14th Anniversary of the ACM Cloud Computing Security Workshop (CCSW), Copenhagen, DENMARK, nov 26, 2023
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation; WASP WARA-Ops Research Arena

Available from: 2024-01-22 Created: 2024-01-22 Last updated: 2025-09-01
7. Homomorphic Encryption Enabled Delta Encoding
Open this publication in new window or tab >>Homomorphic Encryption Enabled Delta Encoding
2024 (English)In: 2024 32ND INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, MASCOTS 2024, IEEE , 2024, p. 64-71Conference paper, Published paper (Refereed)
Abstract [en]

The rapid expansion of cloud computing has transformed data storage and processing by providing unprecedented convenience and scalability. However, this progress is shadowed by significant data security challenges, primarily as users must rely on cloud service providers to enforce robust security protocols. Homomorphic encryption (HE) offers a potential solution by allowing computations on encrypted data, thereby maintaining confidentiality without compromising functionality. However, HE can be computationally intensive, raising concerns about its practicality in real-world applications, particularly when dealing with large files. Moreover, constantly re-encrypting an entire file after every modification is inefficient and introduces substantial performance overheads. While traditional delta encoding can be used to optimize bandwidth by transmitting only file modifications, it faces security and privacy concerns as the server must access unencrypted file contents. In this paper, we address these challenges by introducing a novel delta encoding scheme tailored for seamless compatibility with HE, enhancing data confidentiality while maintaining efficiency. Our approach minimizes the overhead of re-encryption and improves performance by encrypting and transmitting only the modified file parts. We evaluate the performance of our scheme across various parameters and test cases, comparing it to a state-of-the-art delta encoding approach. Our findings demonstrate many similarities while highlighting the tradeoffs of our HE-enabling solution. Additionally, we explore the performance impacts of integrating HE with our delta encoding scheme and provide insights into the practical constraints and requirements for real-world deployment in cloud computing environments.

Place, publisher, year, edition, pages
IEEE, 2024
Series
International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems Proceedings, ISSN 1526-7539, E-ISSN 2375-0227
National Category
Communication Systems
Identifiers
urn:nbn:se:liu:diva-212755 (URN)10.1109/MASCOTS64422.2024.10786566 (DOI)001431496800009 ()2-s2.0-85215081240 (Scopus ID)9798331531317 (ISBN)9798331531300 (ISBN)
Conference
32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Krakow, POLAND, oct 21-23, 2024
Note

Funding Agencies|Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation; WASP WARA-Ops Research Arena

Available from: 2025-04-02 Created: 2025-04-02 Last updated: 2025-09-01
8. Longitudinal Analysis of Wildcard Certificates in the WebPKI
Open this publication in new window or tab >>Longitudinal Analysis of Wildcard Certificates in the WebPKI
Show others...
2023 (English)In: 2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING, IEEE , 2023Conference paper, Published paper (Refereed)
Abstract [en]

The use of wildcard certificates and multi-domain certificates can impact how sensitive a certificate is to attacks and how many (sub)domains and machines may be impacted if a private key is compromised. Unfortunately, there are no globally agreed-upon best practices for these certificate types and the recommendations have changed many times over the years. In this paper, we present a 10-year longitudinal analysis of the usage of wildcard certificates and multi-domain certificates on the internet. Our analysis captures and highlights substantial differences in the heterogenous wildcard and multi-domain certificate practices. The results also show that there are several ways that CAs and domain owners have chosen to improve their practices, with many appearing to reduce the number of domains (and subdomains) for which each certificate is responsible.

Place, publisher, year, edition, pages
IEEE, 2023
Series
IFIP Networking Conference
National Category
Software Engineering
Identifiers
urn:nbn:se:liu:diva-197919 (URN)10.23919/IFIPNetworking57963.2023.10186356 (DOI)001043065000002 ()9783903176577 (ISBN)9798350339383 (ISBN)
Conference
22nd International-Federation-for-Information-Processing (IFIP) Networking Conference (IFIP Networking), Univ Politecnica Catalunya Barcelonatech, Barcelona, SPAIN, jun 12-15, 2023
Note

Funding Agencies|Swedish Foundation for Strategic Research (SSF); Wallenberg AI, Autonomous Systems and Software Program (WASP) - Knut and Alice Wallenberg Foundation

Available from: 2023-09-20 Created: 2023-09-20 Last updated: 2025-09-01
9. Chain-Sawing: A Longitudinal Analysis of Certificate Chains
Open this publication in new window or tab >>Chain-Sawing: A Longitudinal Analysis of Certificate Chains
Show others...
2024 (English)In: Proc. IFIP Networking 2024, IEEE , 2024, p. 122-130Conference paper, Published paper (Refereed)
Abstract [en]

The security and integrity of TLS certificates are essential for ensuring secure transmission over the Internet and protecting millions of people from man-in-the-middle attacks. Certificate Authorities (CAs) play a crucial role in issuing and managing these certificates. This paper presents a longitudinal analysis of certificate chains for popular domains, examining their evolution over time and across different categories. Using publicly available certificate data, primarily from crt.sh, we created a longitudinal dataset of certificate chains for domains from the Tranco top-1M list. After categorizing the certificates based on their type and service category, we analyze a selected set of domains over time and identify the patterns and trends that emerge in their certificate chains. Our analysis reveals several noteworthy trends, including a trend towards shorter certificate chains and fewer paths from domains to root certificates. This implies that the certificate process is becoming more simplified and streamlined. Combined with our observations that there is an increasing use of new CAs and a shift in the types of certificates used that we observe, we expect part of this to be an effect of individual choices made by some popular CAs (e.g., less cross-signings). In general, the observed trends, patterns, and findings capture tradeoffs in overhead, backward compatibility, and security. The quick shifts in some of the observed metrics (e.g., chain lengths) therefore also highlight the importance of continued monitoring and analysis of certificate chains.

Place, publisher, year, edition, pages
IEEE, 2024
Series
IFIP Networking Conference, E-ISSN 1861-2288
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-208860 (URN)10.23919/IFIPNetworking62109.2024.10619717 (DOI)001303907400018 ()2-s2.0-85202431612 (Scopus ID)9783903176638 (ISBN)9798350390605 (ISBN)
Conference
23rd International-Federation-for-Information-Processing (IFIP) Networking Conference (IFIP Networking), Thessaloniki, GREECE, jun 03-06, 2024
Funder
Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-10-27 Created: 2024-10-27 Last updated: 2025-09-01

Open Access in DiVA

fulltext(4794 kB)747 downloads
File information
File name FULLTEXT02.pdfFile size 4794 kBChecksum SHA-512
df1cc234a5d2d35bcb9c86478b19e567658a9fa1ecbc4be31cd91946ddf27aa574ba48d468613423f5247bbf65ef5c4a2434c687d07fe91533e619dca73207ae
Type fulltextMimetype application/pdf
Order online >>

Other links

Publisher's full text

Authority records

Hasselquist, David

Search in DiVA

By author/editor
Hasselquist, David
By organisation
Database and information techniquesFaculty of Science & Engineering
Security, Privacy and Cryptography

Search outside of DiVA

GoogleGoogle Scholar
Total: 868 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 1367 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf