How Far is User Privacy Leakage: A Revisit of Client Certificate Usage

被引:0
|
作者
Yin, Zuyong [1 ]
Zhou, Qi [1 ]
Qu, Junqiu [1 ]
Lv, Fanrong [1 ]
机构
[1] HangZhou Cloudglab Technol Co Ltd, Hangzhou, Peoples R China
关键词
Client certificate; Passive Measuring Instrument; User privacy leakage;
D O I
10.1109/ICCCBDA56900.2023.10154744
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
X.509 Certificates are an important medium for identity authentication when the client establishes a TLS connection with the server. As the security issues on TLS are more and more widely discussed, the TLS1.3 [1] protocol was officially released in 2018 for the sake of enhancing security. The TLS1.3 protocol shares the secret key in the ClientHello phase, so that all information except the hello message is encrypted. Although TLS1.3 is developing rapidly, in our observations, TLS1.2 [2] traffic is still the majority of TLS/SSL traffic, accounting for more than 60%. In this paper, we focus on the measurement of client certificates in the existing internet, by extracting useful information from a passive measurement framework deployed on an enterprise gateway. We perform a comprehensive analysis of the information and disclose some noteworthy flaws in the usage of client certificates that may possibly compromise user privacy.
引用
收藏
页码:279 / 284
页数:6
相关论文
共 50 条
  • [1] Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication
    Wachs, Matthias
    Scheitle, Quirin
    Carle, Georg
    [J]. TMA CONFERENCE 2017 - PROCEEDINGS OF THE 1ST NETWORK TRAFFIC MEASUREMENT AND ANALYSIS CONFERENCE, 2017,
  • [2] Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication
    Wachs, Matthias
    Scheitle, Quirin
    Carle, Georg
    [J]. PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 3 - 3
  • [3] Revisiting User Privacy for Certificate Transparency
    Kales, Daniel
    Omolola, Olamide
    Ramacher, Sebastian
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 432 - 447
  • [4] Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy
    Turk, Ata
    Varia, Mayank
    Kellaris, Georgios
    [J]. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 1011 - 1016
  • [5] Precursor of privacy leakage detection for individual user
    Li, Xuefeng
    Zhao, Chensu
    Hu, Yi
    Xie, Honglin
    Wang, Yuhang
    Zhao, Jingyang
    [J]. COMPUTERS & SECURITY, 2024, 142
  • [6] A comprehensive investigation of user privacy leakage to Android applications
    Ge, Yuming
    Deng, Bo
    Sun, Yi
    Tang, Libo
    Sheng, Dajiang
    Zhao, Yantao
    Xie, Gaogang
    Salamatian, Kave
    [J]. 2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [7] A Practical Implementation of Veiled Certificate for User-Centric Privacy Protection
    Goss, Will
    Huang, Chin-Tser
    [J]. PROCEEDINGS OF THE 50TH ANNUAL ASSOCIATION FOR COMPUTING MACHINERY SOUTHEAST CONFERENCE, 2012,
  • [8] Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles
    Kolias, C.
    Kolias, V.
    Anagnostopoulos, I.
    Kambourakis, G.
    Kayafas, E.
    [J]. THIRD INTERNATIONAL WORKSHOP ON SEMANTIC MEDIA ADAPTATION AND PERSONALIZATION, PROCEEDINGS, 2008, : 170 - +
  • [9] Students' Data Privacy: How Far it is Protected?
    [J]. 2014 INTERNATIONAL CONFERENCE ON INTERACTIVE COLLABORATIVE LEARNING (ICL), 2014, : 619 - 622
  • [10] How Far is Traffic from User Equilibrium?
    Yildirimoglu, Mehmet
    Kahraman, Osman
    [J]. 2017 IEEE 20TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2017,