<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Hard Lesson: Assessing the HTTPS Deployment of Italian University Websites *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Stefano</forename><surname>Calzavara</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Riccardo</forename><surname>Focardi</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Alvise</forename><surname>Rabitti</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Lorenzo</forename><surname>Soligo</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Università Ca&apos; Foscari Venezia</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">HTTPS Deployment of Italian University Websites</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">A Hard Lesson: Assessing the HTTPS Deployment of Italian University Websites *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8E8750A00E3447E7EF9497329CA0E748</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T04:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper we carry out a systematic analysis of the state of the HTTPS deployment of the most popular Italian university websites. Our analysis focuses on three different key aspects: HTTPS adoption and activation, HTTPS certificates, and cryptographic TLS implementations. Our investigation shows that the current state of the HTTPS deployment is unsatisfactory, yet it is possible to significantly improve the level of security by working exclusively at the web application layer. We hope this observation will encourage site operators to take actions to improve the current state of protection.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>HTTP is the workhorse protocol of the Web, yet it does not provide any confidentiality, integrity or authenticity guarantee by default. Standard HTTP traffic is just unauthenticated plaintext, which can be read, modified and forged by attackers who are in control of the network, e.g., rogue access points and malicious Internet service providers. Luckily, this shortcoming of HTTP can be overcome by the adoption of its secure counterpart HTTPS, which runs HTTP on top of cryptographic protocols like TLS. HTTPS is phenomenally popular nowadays, to the point that the amount of HTTPS traffic has finally surpassed the amount of HTTP traffic <ref type="bibr" target="#b11">[12]</ref>. Yet, previous research showed that the correct deployment of HTTPS is particularly tricky and things can go wrong at many different levels <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b17">18]</ref>. This means that the adoption of HTTPS is not just a binary checkbox, but rather multiple factors must be taken into account for a realistic security assessment.</p><p>In this paper we carry out a systematic analysis of the state of the HTTPS deployment of the most popular Italian university websites. In particular, we study:</p><p>• the adoption and activation of HTTPS at the (web) application layer (Section 3). The lack of HTTPS support and the use of unsafe practices in the HTTPS activation can entirely void security against network attackers, since communication might run unencrypted;</p><p>• the use of best practices in HTTPS certificates (Section 4). The incorrect management of HTTPS certificates might unduly expose users to phishing attempts or even lead to the disclosure of the cryptographic keys used to protect communication;</p><p>• the correct cryptographic implementation of the TLS protocol (Section 5). Cryptographic flaws in the TLS deployment can reveal cryptographic keys to network attackers, leading to various confidentiality and integrity breaches.</p><p>In our security assessment we use numeric scores to measure the compliance with respect to security best practices, where higher scores stand for better security. At the end of our study, we assign a final numeric score to all sites and show that the current state of the HTTPS deployment is unsatisfactory, yet it is possible to significantly improve the level of security by working exclusively at the web application layer (Section 6). We hope this observation will encourage site operators to take actions to improve the current state of protection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">HTTPS and TLS</head><p>HTTPS is an encrypted variant of HTTP based on the TLS cryptographic protocol. At a high level, TLS can be described as follows:</p><p>1. The client initiates a handshake with the server by proposing a TLS version and a list of supported ciphersuites;</p><p>2. The server chooses the lower between its highest supported TLS version and the TLS version proposed by the client. It then picks a supported ciphersuite from the proposed list and sends to the client an X.509 certificate, which contains information about the server's identity, the server's public key and the issuing certification authority;</p><p>3. The client confirms the validity of the X.509 certificate by checking that it was issued by a trusted certification authority to the hostname to which it is trying to connect, thus getting a proof of authenticity;</p><p>4. The client and the server take appropriate actions to generate a fresh session key, which is used to protect the communication by means of symmetric encryption, thus ensuring its confidentiality and integrity.</p><p>The session key establishment can be implemented in different ways and takes advantage of the server's public key.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Domains and Sub-Domains</head><p>On the Web, servers are typically identified by a fully qualified domain name (FQDN), i.e., a dot-separated sequence of labels terminated by a top-level domain (TLD) from a fixed list. For example, www.unive.it is a FQDN under the TLD .it. Domain registration typically operates at the granularity of TLD+1: this means that an organization can register a domain name like unive.it and then create arbitrary sub-domains like www.unive.it and idp.unive.it. It is common practice to create different sub-domains for different services, e.g., www.unive.it to serve the university website and idp.unive.it for authentication.</p><p>The security of sub-domains plays an important role on web application security, most notably because sub-domains can share cookies. For example, www.unive.it and idp.unive.it can both set cookies with the Domain attribute set to .unive.it: such cookies, called domain cookies, are sent to both services. Though this practice is useful and popular, e.g., to implement authentication across different sub-domains, it also means that attacking www.unive.it might break the confidentiality and integrity of cookies at idp.unive.it and vice-versa <ref type="bibr" target="#b7">[8]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Threat Model</head><p>We assume an active network attacker who is able to add, remove or modify messages sent between a client and a server. The attacker also controls a malicious website, which is navigated by the attacked client. By means of the website, the attacker can inject scripts in the client from an attacker-controlled origin, which is relevant for a subset of the considered attacks. However, the attacker can neither break the Same Origin Policy (SOP), nor exploit any bug in the browser. We assume the attacker cannot exploit timing side-channels, since the feasibility of such attacks is generally hard to assess.</p><p>In our security analysis, we also occasionally make considerations about passive network attackers, who just sniff the network traffic and do not take actions to avoid detection. These attackers are particularly interesting because they only require very limited skill.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">Analysed Websites</head><p>We focus on the HTTPS deployment of the Italian universities which are included in the QS World University Ranking 2020. <ref type="foot" target="#foot_0">1</ref> We identified 34 universities overall, then extracted their official names from QS and searched for them on Google: the first website in the results page is the one we used as the entry point of our security analysis. The rationale of this choice is that we want to analyse the website which is most likely accessed when users look for a specific university via a search engine. We provide the full list of the analysed websites online <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">HTTPS Adoption and Activation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Security Practices</head><p>When users access a website like www.unive.it without specifying any protocol, browsers normally contact the site using the HTTP protocol. A common practice is then to upgrade the communication to HTTPS through a redirection, e.g., by using the Location header, to send the browser to https://www.unive.it. Though this practice definitely improves security over the plain adoption of HTTP, it is still vulnerable to attacks like SSL stripping <ref type="bibr" target="#b16">[17]</ref>. Specifically, since the first communication still happens over HTTP, the attacker can block the redirection to HTTPS and forcefully prevent the security upgrade to encrypted communication. To avoid this pitfall, websites can deploy HTTP Strict Transport Security (HSTS). HSTS instructs the browser to never contact the website over HTTP, so that every communication attempt on HTTP is automatically upgraded to HTTPS <ref type="bibr" target="#b12">[13]</ref>.</p><p>There are several deployment options for HSTS. Specifically, HSTS can be activated using the Strict-Transport-Security header, using the max-age attribute to specify the lifetime of protection. The includeSubDomains option can be used to extend the HTTPS upgrade to all the sub-domains of the protected website, which is particularly useful to protect other web applications and ensure the confidentiality and integrity of cookies shared among them <ref type="bibr" target="#b7">[8]</ref>. To further reduce the attack surface of the "trust upon first use" model of HSTS, browsers include a preload list of HSTS-protected websites: communication with such websites is automatically upgraded to HTTPS, even before getting the HSTS header from them.</p><p>Finally, once a website is accessed over HTTPS, it is important that it does not include subresources over HTTP, otherwise the confidentiality and integrity guarantees of HTTPS can be undermined. Modern browsers mitigate this severe threat by implementing the Mixed Content policy. <ref type="foot" target="#foot_1">2</ref> Roughly, this policy mandates that active contents like scripts must be blocked when they are included in HTTPS pages over HTTP connections, while browser vendors are left at liberty of being more tolerant towards passive content like images. It is a good practice to avoid the use of mixed content in high-security sites to ensure appropriate protection also to users of browsers which do not implement the Mixed Content policy, e.g., legacy browsers. It is worth noticing that, starting from 2020, Google Chrome will automatically block all forms of mixed content. <ref type="foot" target="#foot_2">3</ref> It is thus even more important to avoid the use of mixed content to prevent breakage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Security Measurement</head><p>To analyse the practices used to activate HTTPS, we have to check for the presence of redirects. Since redirects can be performed using JavaScript, we cannot just check for the use of Location headers and we rather use Puppeteer<ref type="foot" target="#foot_3">4</ref> to access the websites over HTTP using Chrome. We then check the protocol used in the final landing page to see whether HTTPS was activated in some way since the original HTTP request. Since Puppeteer has access to the response headers of the landing page, we can also use it to log the presence of HSTS headers. However, this is not entirely sufficient, because HSTS activation can (and should) be forced on the TLD+1 using the includeSubDomains option; we then also check for the presence of such headers there using the curl command line tool. Finally, we assign each website a score as follows:</p><p>• 0 points: no redirection to HTTPS took place. This means that the navigation is performed over HTTP by default, which makes network attacks trivial to carry out;</p><p>• 3 points: redirection from HTTP to HTTPS, but lack of HSTS adoption. The website is vulnerable to SSL stripping, yet it is normally served over HTTPS and careful users might notice when the site is unexpectedly served over HTTP;</p><p>• 5 points: redirection from HTTP to HTTPS + HSTS. The website is protected against SSL stripping, but other applications served on sub-domains might be vulnerable to this attack and domain cookies might be leaked or set over HTTP;</p><p>• 7 points: redirection from HTTP to HTTPS + HSTS with the includeSubDomains option on TLD+1. This ensures that all the applications on the domain are always accessed over HTTPS, as well as granting the confidentiality and integrity of domain cookies.</p><p>As for mixed content checking, we still rely on Puppeteer to track all the outgoing HTTP requests of the accessed web pages, including their type. We then assign the following scores:</p><p>• 0 points: presence of active mixed content in the homepage. The integrity of the page is seriously at harm on legacy clients not implementing the Mixed Content specification;</p><p>• 1 point: presence of passive mixed content in the homepage. Website defacement is potentially possible and there is a significant risk of privacy breaches due to the presence of outgoing HTTP requests, even on modern clients which are tolerant on such content;</p><p>• 2 points: there is no presence of mixed content in the homepage. This ensures that the full page content is served over encrypted connections, which is necessary to provide optimal confidentiality and integrity guarantees.</p><p>Based on this scoring system, websites with a score lower than 5 are not secure even against passive network attackers, since they either do not redirect to HTTPS or include some HTTP content in the homepage. A minimal score for protection against active network attackers is 7: this ensures that SSL stripping is not possible and that the confidentiality and integrity of the homepage cannot be trivially harmed by the use of mixed content.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Experimental Results</head><p>The first observation we make is that the majority of the websites is eventually accessed over HTTPS: this is the case for 28 out of 34 websites (82%). As to the remaining 6 websites, we observed that web.uniroma2.it, poliba.it, www.unina.it and www.unipa.it do not perform any redirection to HTTPS, but can still be accessed over HTTPS when the protocol is explicitly typed in the browser address bar. This means that users can access these sites securely, but the very large majority of users is normally left unprotected; in particular, even passive network attackers have full visibility of the exchanged HTTP traffic. The other two websites are even more problematic from a security perspective, because www.uniroma3.it cannot be accessed over HTTPS and www.unife.it forces an explicit downgrade from HTTPS to HTTP using JavaScript. We manually verified that both websites have a private area, which is accessible over HTTPS. However, this is clearly not sufficient for security, because an active network attacker can break the integrity of the homepage and force the adoption of the HTTP protocol also on the private area. Given that it is not possible to navigate these two sites over HTTPS, we excluded them from all further analyses. As to the 28 websites which force the activation of HTTPS in some way, they mostly do it by means of redirects: we observed that this is the case for 25 websites. The security implication is that the majority of the Italian university websites are vulnerable to SSL stripping. Only 3 websites make use of HSTS: www.unibo.it, www.unifi.it and www.polimi.it, with the latter two even activating the includeSubDomains option. Unfortunately, in both cases, this is not done on the TLD+1, but on the www sub-domain, which essentially voids protection.</p><p>As for the presence of mixed content, the picture is largely positive, yet we also observed two insecure practices due to the use of passive mixed content. First, www.unina.it includes an image over HTTP, which is sufficient to leak the website cookies even against a passive network attacker who just sniffs the HTTP traffic. A second problem affects www.unipa.it, where the form of the internal search engine is sent over HTTP: this might not only expose the website cookies, but also reveal all the search keywords typed by the website users, including the corresponding results.</p><p>The complete picture of this part of our analysis is summarized by the scores in the "Activation" column at <ref type="bibr" target="#b5">[6]</ref>. It turns out that 6 out of 34 websites do not comply with minimal security practices, hence are completely at harm even against passive network attackers: in particular, 4 sites got a score lesser than 5 and 2 sites were excluded from our analysis because they could not be accessed over HTTPS in the first place. The other 28 websites offer a minimal degree of protection against passive network attackers by ensuring that communication is encrypted and by ruling out mixed content from their homepages, yet only 3 of them implement safeguards against active tampering attempts like SSL stripping.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">HTTPS Certificates</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Security Practices</head><p>It is well-known that certificates should only be signed by a trusted certification authority and should only be considered valid up to a given expiration date. What is likely less known is that certificates come in different forms. In particular, by increasing level of security guarantees:</p><p>1. Domain Validated (DV) certificates are issued after proving some form of control over a given domain name, but do not provide any form of binding between the domain name and the organization which claims ownership of the domain;</p><p>2. Organization Validated (OV) certificates are only issued after proving that a domain name is actually controlled by a given physical organization. This requires the presentation of appropriate documentation about the organization asking for the certificate;</p><p>3. Extended Validated (EV) certificates are similar to OV certificates, but are subject to even stricter security checks. Browsers often rely on custom security indicators for EV certificates and show the name of the owning organization directly in the address bar.</p><p>Major organizations like universities should only use OV or EV certificates, since DV certificates provide no protection against phishing attempts. For example, an attacker could get a valid DV certificate for www.unvie.it and host a website which pretends to be the legitimate website of Università Ca' Foscari Venezia (www.unive.it). <ref type="foot" target="#foot_4">5</ref>Moreover, security-conscious administrators should avoid the use of wildcard certificates. Wildcard certificates apply to arbitrary sub-domains like *.unive.it, hence are typically reused on a multitude of different hosts. This simplifies the HTTPS deployment, but also implies that all such hosts have access to the same cryptographic keys, hence the compromise of any host would suffice to get read and write access to all the HTTPS traffic exchanged with any subdomain of unive.it. Wildcards cannot be used in EV certificates, but it is worth noticing that even certificates which do not make use of wildcards might be unduly issued for a large number of domains by specifying multiple Subject Alternative Names (SANs) in them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Security Measurement</head><p>We check the use of certificates at the analysed websites by using the openssl tool from the command line. In particular, we rely on the following scoring system:</p><p>• 0 points: the certificate is not signed by a trusted certification authority or has expired.</p><p>In the former case a network attacker can just replace the server's certificate with a fake one while going unnoticed, while in the latter case it is plausible that keys might have been compromised over time, e.g., by brute-forcing;</p><p>• 2 points: the website uses a valid DV certificate signed by a trusted certification authority. This provides both confidentiality and integrity, but not necessarily authenticity;</p><p>• 4 points: the website uses a valid OV certificate signed by a trusted certification authority. This gives attentive and technically educated users a way to check the identity of the server's organization when in doubt;</p><p>• 5 points: the website uses a valid EV certificate signed by a trusted certification authority. This provides immediate visual feedback about the identity of the server's organization or at least easy access to this information.</p><p>Finally, we award 2 extra points to certificates which are only valid for a "small" number of domain names. Such certificates do not make use of wildcards and keep the number of SANs under a given threshold t. To choose t, we rely on the distribution of the number of SANs in the collected certificates as reported below.</p><p>Based on this scoring system, certificates should be awarded at least 6 points to be considered compliant with security best practices: this requirement is satisfied by OV and EV certificates with only limited reuse on multiple domains.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Experimental Results</head><p>We start by discussing a positive result: all the analysed websites have valid certificates and none of them relies on DV certificates. This means that minimal security practices to ensure communication security and complicate phishing attempts are put in place, and all websites were awarded at least 4 points. Only 5 websites, however, use EV certificates: www.unimore.it, www.unipg.it, www.unitn.it, www.uniud.it and www.unive.it. An interesting fact is that all the collected certificates were issued by the same certification authority (TERENA).</p><p>We also noticed that only two websites make use of wildcard certificates, i.e., www.unibo.it and www.unicatt.it. This means that most certificates cannot be arbitrarily reused on subdomains, which is important to minimize the risk of leaking private keys and reduce the attack surface. There are however a few interesting observations about the use of SANs, since their distribution is highly skewed. In particular, the mode of the distribution is 2, the mean is 21.7 and the variance is 47.4. We show the full frequency table of the number of SANs in Table <ref type="table" target="#tab_1">1</ref>.</p><p>Observe that there are a few cases where the certificate is valid for so many domains that it is essentially equivalent to having a wildcard: for example, the certificate of www.unifi.it is valid on 247 different domains. Based on the collected numbers, we empirically set the threshold t = 10: indeed, 24 out of 32 certificates use a number of SANs which is lower than this threshold, hence it is common practice to avoid a more widespread certificate reuse.</p><p>The complete picture of this part of our analysis is summarized by the scores in the "Certificate" column at <ref type="bibr" target="#b5">[6]</ref>. The numbers confirm the good state of the certificate ecosystem of Italian university websites. Though EV certificates are still underrepresented, DV certificates are not used on website homepages and 22 out of 32 certificates (69%) were awarded the extra points granted by the limited amount of reuse on multiple domains.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Cryptographic Implementations</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Security Practices</head><p>Even when HTTPS is up and running, cryptographic flaws in the implementation of TLS may break its intended security guarantees. Researchers identified several attacks against TLS in the past, which may even lead to the disclosure of the cryptographic keys used to protect the HTTP traffic <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b17">18]</ref>. In recent work, our research group developed a tool which automates the detection of TLS vulnerabilities exploitable on modern clients and estimates their impact on web application security <ref type="bibr" target="#b4">[5]</ref>. Part of the tool has been recently integrated in the Discovery service of Cryptosense and is publicly available online. Given a domain name like www.unive.it, the tool performs a cryptographic assessment of all the hosts to which www.unive.it might resolve. Moreover, the tool also analyzes all the hosts to which any other sub-domain of unive.it might resolve, since other web applications might be hosted there. Finally, the security analysis is done on all the hosts from which the web page at www.unive.it is including content, e.g., scripts and stylesheets. Cryptographic vulnerabilities on such hosts might seriously undermine page integrity and introduce confidentiality breaches, despite the adoption of the HTTPS protocol.</p><p>The output of the tool builds on the following taxonomy of insecure channels:</p><p>1. Leaky channels: established with servers vulnerable to confidentiality attacks, which give the attacker the ability to decrypt the network traffic;</p><p>2. Tainted channels: susceptible to man-in-the-middle attacks, which give the attacker the ability to decrypt and arbitrarily modify the network traffic. Observe that tainted channels are also leaky by definition;</p><p>3. Partially leaky channels: suffering from side-channels, which give the attacker the ability to disclose selected "small" secrets (like cookies) over time. Observe that leaky and tainted channels also qualify as partially leaky.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Security Measurement</head><p>We assign to each website a score from 0 to 4 based on the following system:</p><p>• 1 point: no (partially) leaky channel on the main domain or domains from which resources are loaded from the homepage. This ensures that network attackers cannot leverage cryptographic flaws to disclose information on the homepage;</p><p>• 1 point: no tainted channel on the main domain or domains from which resources are loaded from the homepage. This ensures that network attackers cannot exploit cryptographic flaws to undermine the integrity of the homepage;</p><p>• 1 point: no (partially) leaky channel on sub-domains. This is important at the very least to ensure the confidentiality of domain cookies;</p><p>• 1 point: no tainted channel on sub-domains. This is important at the very least to ensure the confidentiality and integrity of domain cookies.</p><p>Notice that, since tainted channels are also (partially) leaky, integrity violations effectively weigh twice as much as confidentiality violations in our scoring system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Experimental Results</head><p>At the end of our measurement, we analysed 2,654 domains. In particular, we scanned 2,601 sub-domains of Italian universities and 53 external domains from which resources are loaded on the homepage of the analysed websites, the large majority of these being well-known analytics or library providers. This is already an interesting observation, because it shows that the attack surface is mostly under the control of the universities and does not significantly depend upon the security settings of external entities. This is in stark contrast with what we observed in general websites from the Alexa list <ref type="bibr" target="#b4">[5]</ref>. On the other hand, the average number of sub-domains analysed on each website is 83: this is in line with our previous study, where we emphasized the growing importance of sub-domains on web application security.</p><p>A positive result of our analysis is that, as long as we focus on the main domain and the homepage of the analysed websites, the quality of the cryptographic deployment is very high. We were not able to find any cryptographic flaw which could affect the confidentiality and the integrity guarantees of the homepages. Unfortunately, the picture is way less positive when we turn our attention to sub-domains, given the size of the attack surface. In particular, we found tainted channels on at least one sub-domain on 15 out of 32 analyzed main domains. The key culprits of this are vulnerabilities enabling attacks like DROWN <ref type="bibr" target="#b2">[3]</ref> and ROBOT <ref type="bibr" target="#b3">[4]</ref>. The summary of our findings is given by the scores in the "Cryptography" column at <ref type="bibr" target="#b5">[6]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Closing Remarks</head><p>We draw the key conclusions of our study, discussing ethical considerations and limitations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1">Italian University Websites: Secure or Not?</head><p>To understand the state of the HTTPS deployment on the Italian university websites, we take a final look at the collected data <ref type="bibr" target="#b5">[6]</ref> and assign a final score to each website as follows:</p><p>1. Insecure (6 sites): these websites got a score lower than 5 in the "Activation" column or could not be accessed over HTTPS. The implication is that these sites do not satisfy even minimal security requirements, because they suffer from confidentiality flaws even against passive network attackers;</p><p>2. At risk (25 sites): these websites got a score of 5 in the "Activation" column. They do provide a minimal level of protection, in particular against passive network attackers, but they are vulnerable to active tampering which can bypass HTTPS (SSL stripping);</p><p>3. Acceptable (2 sites): these websites got a score of at least 7 in the "Activation" column, but got a score lower than 6 in the "Certificate" column or a score lower than 4 in the "Cryptography" column. Though these sites implement some safeguards against active network attackers, they also take unnecessary risks in their certificate management, e.g., by abusing of certificate reuse, or suffer from crytographic flaws which can be exploited by sophisticated attacks;</p><p>4. Close to secure (1 site): we put in this category all the other websites. We do not call this category "secure", because none of the analysed websites implement state-of-the-art protection mechanisms against all the considered threats.</p><p>In the end, our analysis shows that the current state of the HTTPS deployment of Italian university websites is unsatisfactory, because active network attackers have easy life on the very large majority of the analysed sites. However, our analysis also has positive implications, because it shows a reasonable state of health of the certificate and cryptographic ecosystems. This means that many websites can improve their security with limited effort by exclusively working at the web application layer. In particular, we observe that activating HSTS on the 25 websites marked as at risk would lead to the following improvement: 16 websites would be deemed acceptable and 9 websites would be considered close to secure (or even better). We hope this observation will encourage site operators to take actions to improve the current state of protection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2">Ethics and Limitations</head><p>Due to both legal and ethical reasons, our analysis of TLS vulnerabilities in the wild was limited to an unintrusive scan based on the use of publicly available tools. The exploitability of the discovered vulnerabilities was exclusively judged through a systematic analysis of the output of those tools, as discussed in previous work <ref type="bibr" target="#b4">[5]</ref>. The analyses of HTTPS activation and HTTPS certificates do not pose legal or ethical implications.</p><p>A limitation of our analysis is that it considers the homepage of the website as the key entry point. Though this makes sense from the perspective of a navigation session, it is possible that security-sensitive services are deployed on external domains which we did not analyse. Notice, however, that we provided a reasonable coverage of the security guarantees of sub-domains. A second limitation of our study is that we did not authenticate to the analysed websites, because we do not own valid access credentials for them. Finally, it is worth mentioning that our analysis is entirely focused on network attackers: we leave the study of security mechanisms designed to prevent web attacks to future work.</p><p>We are making plans to responsibly disclose all our results with the technical staff of the universities involved in our study. For now, we contacted our own IT office at Ca' Foscari and convinced them to activate HSTS on www.unive.it. We hope we will be just as successful with further disclosures. leverages a research tool which only captures exploitable vulnerabilities still working on modern clients and are thus particularly relevant from a security perspective <ref type="bibr" target="#b4">[5]</ref>.</p><p>Besides cryptographic vulnerabilities, there might be several other reasons why HTTPS deployments turn out to be susceptible to attacks <ref type="bibr" target="#b13">[14]</ref>. SSL stripping is a prominent example of an application layer attack against HTTPS <ref type="bibr" target="#b16">[17]</ref>. To prevent it, browsers had to implement a new security mechanism in the form of HSTS. Kranch and Bonneau measured the HSTS adoption in the wild in 2015 and found it very limited; also, they observed that many configurations turn out to be insecure <ref type="bibr" target="#b12">[13]</ref>. Luckily, anecdotal evidence shows that HSTS has been gaining traction over the years: for example, a recent small-scale session security study on 20 popular sites found that more than a half of the analyzed sites made use of HSTS <ref type="bibr" target="#b7">[8]</ref>. Other studies on HTTPS security focused on the certificate ecosystem <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b0">1,</ref><ref type="bibr" target="#b14">15]</ref> and certificate errors in particular <ref type="bibr" target="#b1">[2]</ref>.</p><p>The present paper positions itself in the popular research line of security measurements of the Web. For example, previous work analyzed the security of European sites <ref type="bibr" target="#b20">[20]</ref> and Chinese sites <ref type="bibr" target="#b9">[10]</ref>. Other papers, instead, focused on the adoption of selected web security mechanisms like Content Security Policy <ref type="bibr" target="#b6">[7]</ref>, Cross Origin Resource Sharing <ref type="bibr" target="#b8">[9]</ref> and postMessage <ref type="bibr" target="#b19">[19]</ref>. We would like to expand our security analysis to also cover these important aspects.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>6</head><label></label><figDesc>Number of SANs Number of Websites Frequency</figDesc><table><row><cell>1</cell><cell>6</cell><cell>18.8%</cell></row><row><cell>2</cell><cell>9</cell><cell>28.1%</cell></row><row><cell>3</cell><cell>2</cell><cell>6.3%</cell></row><row><cell>4</cell><cell>3</cell><cell>9.4%</cell></row><row><cell>6</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>7</cell><cell>3</cell><cell>9.4%</cell></row><row><cell>19</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>29</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>31</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>49</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>71</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>85</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>95</cell><cell>1</cell><cell>3.1%</cell></row><row><cell>247</cell><cell>1</cell><cell>3.1%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 :</head><label>1</label><figDesc>Frequency table for the observed number of SANs</figDesc><table /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://www.topuniversities.com/university-rankings/world-university-rankings/2020</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">https://www.w3.org/TR/mixed-content/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">https://github.com/puppeteer/puppeteer</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">We actually registered www.unvie.it after realizing that this is one of our most common typos...</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">https://discovery.cryptosense.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">Related WorkMany papers presented attacks exploiting cryptographic vulnerabilities in TLS, like DROWN<ref type="bibr" target="#b2">[3]</ref>, ROBOT<ref type="bibr" target="#b3">[4]</ref> and TLS-POODLE<ref type="bibr" target="#b17">[18]</ref>. The presence of such flaws in the wild is well-known and constantly measured by organizations like Qualys.<ref type="bibr" target="#b6">7</ref> In this paper, we focused on the analysis of cryptographic vulnerabilities in the Italian university websites, which is an important and interesting aspect for our country and the ITASEC community. Most importantly, our analysis 7 https://www.ssllabs.com/ssl-pulse/</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Let&apos;s encrypt: An automated certificate authority to encrypt the entire web</title>
		<author>
			<persName><forename type="first">Josh</forename><surname>Aas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><surname>Barnes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Benton</forename><surname>Case</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zakir</forename><surname>Durumeric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Peter</forename><surname>Eckersley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alan</forename><surname>Flores-López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Alex</forename><surname>Halderman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jacob</forename><surname>Hoffman-Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><surname>Kasten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eric</forename><surname>Rescorla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Seth</forename><forename type="middle">D</forename><surname>Schoen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Brad</forename><surname>Warren</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019</title>
				<meeting>the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019<address><addrLine>London, UK</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">November 11-15, 2019. 2019</date>
			<biblScope unit="page" from="2473" to="2487" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Where the wild warnings are: Root causes of chrome HTTPS certificate errors</title>
		<author>
			<persName><forename type="first">Emily</forename><surname>Mustafa Emre Acer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Adrienne</forename><forename type="middle">Porter</forename><surname>Stark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sascha</forename><surname>Felt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Radhika</forename><surname>Fahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bhanu</forename><surname>Bhargava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matt</forename><surname>Dev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ryan</forename><surname>Braithwaite</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Parisa</forename><surname>Sleevi</surname></persName>
		</author>
		<author>
			<persName><surname>Tabriz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017</title>
				<meeting>the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017<address><addrLine>Dallas, TX, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-11-03">October 30 -November 03, 2017. 2017</date>
			<biblScope unit="page" from="1407" to="1420" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">DROWN: Breaking TLS Using SSLv2</title>
		<author>
			<persName><forename type="first">Nimrod</forename><surname>Aviram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sebastian</forename><surname>Schinzel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Juraj</forename><surname>Somorovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nadia</forename><surname>Heninger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maik</forename><surname>Dankel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jens</forename><surname>Steube</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Luke</forename><surname>Valenta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Alex</forename><surname>David Adrian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Viktor</forename><surname>Halderman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Emilia</forename><surname>Dukhovni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shaanan</forename><surname>Käsper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Susanne</forename><surname>Cohney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christof</forename><surname>Engels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yuval</forename><surname>Paar</surname></persName>
		</author>
		<author>
			<persName><surname>Shavitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th USENIX Security Symposium (USENIX Security 16)</title>
				<meeting>the 25th USENIX Security Symposium (USENIX Security 16)</meeting>
		<imprint>
			<publisher>USENIX Association</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="689" to="706" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Return Of Bleichenbacher&apos;s Oracle Threat (ROBOT)</title>
		<author>
			<persName><forename type="first">Hanno</forename><surname>Böck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Juraj</forename><surname>Somorovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Craig</forename><surname>Young</surname></persName>
		</author>
		<idno>2018-10-29</idno>
	</analytic>
	<monogr>
		<title level="j">Cryptology ePrint Archive</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Postcards from the post-http world: Amplification of HTTPS vulnerabilities in the web ecosystem</title>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Calzavara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Riccardo</forename><surname>Focardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matús</forename><surname>Nemec</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alvise</forename><surname>Rabitti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marco</forename><surname>Squarcina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy, SP 2019</title>
				<meeting><address><addrLine>San Francisco, CA, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019-05-19">2019. May 19-23, 2019. 2019</date>
			<biblScope unit="page" from="281" to="298" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Calzavara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Riccardo</forename><surname>Focardi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alvise</forename><surname>Rabitti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lorenzo</forename><surname>Soligo</surname></persName>
		</author>
		<ptr target="https://secgroup.dais.unive.it/https_universities/" />
		<title level="m">Results of our security assessment</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Semantics-based analysis of content security policy deployment</title>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Calzavara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alvise</forename><surname>Rabitti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michele</forename><surname>Bugliesi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">TWEB</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">36</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Testing for integrity flaws in web sessions</title>
		<author>
			<persName><forename type="first">Stefano</forename><surname>Calzavara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alvise</forename><surname>Rabitti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alessio</forename><surname>Ragazzo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michele</forename><surname>Bugliesi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Security -ESORICS 2019 -24th European Symposium on Research in Computer Security</title>
				<meeting><address><addrLine>Luxembourg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">September 23-27, 2019. 2019</date>
			<biblScope unit="page" from="606" to="624" />
		</imprint>
	</monogr>
	<note>Proceedings, Part II</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">We still don&apos;t have secure cross-domain requests: an empirical study of CORS</title>
		<author>
			<persName><forename type="first">Jianjun</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jian</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hai-Xin</forename><surname>Duan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tao</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shuo</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vern</forename><surname>Paxson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Min</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">27th USENIX Security Symposium, USENIX Security 2018</title>
				<meeting><address><addrLine>Baltimore, MD, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">August 15-17, 2018. 2018</date>
			<biblScope unit="page" from="1079" to="1093" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Security analysis of the chinese web: How well is it protected?</title>
		<author>
			<persName><forename type="first">Ping</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nick</forename><surname>Nikiforakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lieven</forename><surname>Desmet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christophe</forename><surname>Huygens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig &apos;14</title>
				<meeting>the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig &apos;14<address><addrLine>Scottsdale, Arizona, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014-11-03">November 3, 2014. 2014</date>
			<biblScope unit="page" from="3" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Analysis of the HTTPS certificate ecosystem</title>
		<author>
			<persName><forename type="first">Zakir</forename><surname>Durumeric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><surname>Kasten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Bailey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Alex</forename><surname>Halderman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2013 Internet Measurement Conference, IMC 2013</title>
				<meeting>the 2013 Internet Measurement Conference, IMC 2013<address><addrLine>Barcelona, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">October 23-25, 2013. 2013</date>
			<biblScope unit="page" from="291" to="304" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Measuring HTTPS adoption on the web</title>
		<author>
			<persName><forename type="first">Adrienne</forename><surname>Porter Felt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><surname>Barnes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">April</forename><surname>King</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chris</forename><surname>Palmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chris</forename><surname>Bentzel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Parisa</forename><surname>Tabriz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26th USENIX Security Symposium, USENIX Security 2017</title>
				<meeting><address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">August 16-18, 2017. 2017</date>
			<biblScope unit="page" from="1323" to="1338" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning</title>
		<author>
			<persName><forename type="first">Michael</forename><surname>Kranch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joseph</forename><surname>Bonneau</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">22nd Annual Network and Distributed System Security Symposium, NDSS 2015</title>
				<meeting><address><addrLine>San Diego, California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">February 8-11, 2015, 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">i have no idea what i&apos;m doing&quot; -on the usability of deploying HTTPS</title>
		<author>
			<persName><forename type="first">Katharina</forename><surname>Krombholz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wilfried</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>Schmiedecker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Edgar</forename><forename type="middle">R</forename><surname>Weippl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26th USENIX Security Symposium, USENIX Security 2017</title>
				<meeting><address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">August 16-18, 2017. 2017</date>
			<biblScope unit="page" from="1339" to="1356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Tracking certificate misissuance in the wild</title>
		<author>
			<persName><forename type="first">Deepak</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zhengping</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matthew</forename><surname>Hyder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joseph</forename><surname>Dickinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gabrielle</forename><surname>Beck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><surname>Adrian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joshua</forename><surname>Mason</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zakir</forename><surname>Durumeric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">Alex</forename><surname>Halderman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Bailey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Symposium on Security and Privacy, SP 2018, Proceedings</title>
				<meeting><address><addrLine>San Francisco, California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018-05-23">2018. 21-23 May 2018. 2018</date>
			<biblScope unit="page" from="785" to="798" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Lost in tls? no more! assisted deployment of secure TLS configurations</title>
		<author>
			<persName><forename type="first">Salvatore</forename><surname>Manfredi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Silvio</forename><surname>Ranise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giada</forename><surname>Sciarretta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Data and Applications Security and Privacy XXXIII -33rd Annual IFIP WG 11.3 Conference, DBSec 2019</title>
				<meeting><address><addrLine>Charleston, SC, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">July 15-17, 2019. 2019</date>
			<biblScope unit="page" from="201" to="220" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">New Tricks for Defeating SSL in Practice</title>
		<author>
			<persName><forename type="first">Moxie</forename><surname>Marlinspike</surname></persName>
		</author>
		<idno>2019-02-12</idno>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">This POODLE Bites: Exploiting The SSL 3</title>
		<author>
			<persName><forename type="first">Bodo</forename><surname>Möller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thai</forename><surname>Duong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Krzysztof</forename><surname>Kotowicz</surname></persName>
		</author>
		<imprint>
			<biblScope unit="page">0</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title/>
		<author>
			<persName><surname>Fallback</surname></persName>
		</author>
		<idno>2018-10-29</idno>
	</analytic>
	<monogr>
		<title level="j">Online</title>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The postman always rings twice: Attacking and defending postmessage in HTML5 websites</title>
		<author>
			<persName><forename type="first">Sooel</forename><surname>Son</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vitaly</forename><surname>Shmatikov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">20th Annual Network and Distributed System Security Symposium, NDSS 2013</title>
				<meeting><address><addrLine>San Diego, California, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">February 24-27, 2013, 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Large-scale security analysis of the web: Challenges and findings</title>
		<author>
			<persName><forename type="first">Ping</forename><surname>Tom Van Goethem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nick</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lieven</forename><surname>Nikiforakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wouter</forename><surname>Desmet</surname></persName>
		</author>
		<author>
			<persName><surname>Joosen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Trust and Trustworthy Computing -7th International Conference, TRUST 2014</title>
				<meeting><address><addrLine>Heraklion, Crete, Greece</addrLine></address></meeting>
		<imprint>
			<publisher>Proceedings</publisher>
			<date type="published" when="2014-07-02">June 30 -July 2, 2014. 2014</date>
			<biblScope unit="page" from="110" to="126" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
