@inbook{82eb40d3370a41f08eaa65c7b384ae28,
title = "A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment",
abstract = "Some of the well-known vulnerabilities like DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols and cipher-suites in SSL/TLS protocol. Recently, new vulnerabilities are also frequently discovered and could be used to mount attacks on systems whose configurations are not updated in time or were misconfigured from the start. Thus, we provide an overview of the landscape of vulnerabilities relating to SSL/TLS protocol versions with estimated risk levels. Selecting the best configuration for a given use-case is a time-consuming task and testing a given configuration of a server for all known vulnerabilities is also difficult. Thus, there is a great motivation to create a new tool that abstracts the tedious parts of this process. Our new software solution can automatically scan and rate the configuration of servers and help in selecting suitable ones. The goal is to simplify testing and evaluation of server-side configurations of SSL/TLS and ciphersuites for the community and thus the software is released as an open source.",
keywords = "BEAST attack, CRIME and BREACH attack, Heartbleed attack, Privacy, Renegotiaition attack, Security, SSL, TLS, TLS handshake",
author = "Lamya Alqaydi and Yeun, \{Chan Yeob\} and Ernesto Damiani",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Switzerland AG.",
year = "2019",
doi = "10.1007/978-3-319-98370-7\_7",
language = "British English",
series = "Studies in Computational Intelligence",
publisher = "Springer Verlag",
pages = "78--88",
booktitle = "Studies in Computational Intelligence",
address = "Germany",
}