Does certificate transparency break the web? measuring adoption and error rate

35Citations
Citations of this article
72Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Certificate Transparency (CT) is an emerging system for enabling the rapid discovery of malicious or misissued certificates. Initially standardized in 2013, CT is now finally beginning to see widespread support. Although CT provides desirable security benefits, web browsers cannot begin requiring all websites to support CT at once, due to the risk of breaking large numbers of websites. We discuss challenges for deployment, analyze the adoption of CT on the web, and measure the error rates experienced by users of the Google Chrome web browser. We find that CT has so far been widely adopted with minimal breakage and warnings. Security researchers often struggle with the tradeoff between security and user frustration: rolling out new security requirements often causes breakage. We view CT as a case study for deploying ecosystem-wide change while trying to minimize end user impact. We discuss the design properties of CT that made its success possible, as well as draw lessons from its risks and pitfalls that could be avoided in future large-scale security deployments.

Cite

CITATION STYLE

APA

Stark, E., Sleevi, R., Muminovic, R., O’Brien, D., Messeri, E., Felt, A. P., … Tabriz, P. (2019). Does certificate transparency break the web? measuring adoption and error rate. In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2019-May, pp. 211–226). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SP.2019.00027

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free