{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:47Z","timestamp":1775873567096,"version":"3.50.1"},"reference-count":79,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/sp.2014.15","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T14:57:47Z","timestamp":1417013867000},"page":"114-129","source":"Crossref","is-referenced-by-count":155,"title":["Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL\/TLS Implementations"],"prefix":"10.1109","author":[{"given":"Chad","family":"Brubaker","sequence":"first","affiliation":[]},{"given":"Suman","family":"Jana","sequence":"additional","affiliation":[]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Vitaly","family":"Shmatikov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"79","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"78","article-title":"The inconvenient truth about Web certificates","author":"vratonjic","year":"2011","journal-title":"WEIS"},{"key":"77","article-title":"Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate","author":"stevens","year":"2009","journal-title":"Crypto"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.109"},{"key":"33","author":"cve-2014-0092","year":"2014"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"39","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572305"},{"key":"38","article-title":"Mining your Ps and Qs: Detection of widespread weak keys in network devices","author":"heninger","year":"2012","journal-title":"Usenix Security"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273468"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.15"},{"key":"41","article-title":"Reducing the costs of bounded-exhaustive testing","author":"jagannath","year":"2009","journal-title":"FASE"},{"key":"40","author":"cve-2011-0228","year":"2011"},{"key":"67","year":"2006","journal-title":"The Transport Layer Security (TLS) Protocol"},{"key":"66","year":"2000","journal-title":"HTTP over TLS"},{"key":"69","year":"2008","journal-title":"Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"},{"key":"68","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol"},{"key":"22","year":"2011","journal-title":"Diginotar Issues Dodgy SSL Certificates for Google Services after Break-in"},{"key":"23","author":"dijkstra","year":"1976","journal-title":"A Discipline of Programming"},{"key":"24","author":"duong","year":"2011","journal-title":"Here Come the ?ninjas"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"26","article-title":"ZMap: Fast Internet-wide scanning and its security applications","author":"durumeric","year":"2013","journal-title":"Usenix Security"},{"key":"27","article-title":"An observatory for the SSLiverse","author":"eckersley","year":"2010","journal-title":"DefCon"},{"key":"28","article-title":"Static and dynamic analysis: Synergy and duality","author":"ernst","year":"2003","journal-title":"WODA"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"key":"2","article-title":"Alice in warningland: A largescale field study of browser security warning effectiveness","author":"akhawe","year":"2013","journal-title":"Usenix Security"},{"key":"1","article-title":"Here's my cert, so trust me, maybe? Understanding TLS errors on the Web","author":"akhawe","year":"2013","journal-title":"WWW"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"30","year":"2001","journal-title":"FIPS PUB 140-2 Security Requirements for Cryptographic Modules"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.90"},{"key":"5","article-title":"Vulnerable me: Measuring systemic weaknesses in mobile browser security","author":"amrutkar","year":"2012","journal-title":"ICISS"},{"key":"32","article-title":"Systematic testing of refactoring engines on real software projects","author":"gligoric","year":"2013","journal-title":"ECOOP"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/2523649.2523665","article-title":"No attack necessary: The surprising dynamics of SSL trust relationships","author":"amann","year":"2013","journal-title":"ACSAC"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"70","year":"2011","journal-title":"The Secure Sockets Layer (SSL) Protocol"},{"key":"71","year":"2011","journal-title":"Representation and Verification of Domain-based Application Service Identity Within Internet Public Key Infrastructure Using X 509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)"},{"key":"9","article-title":"Remote timing attacks are practical","author":"brumley","year":"2003","journal-title":"Usenix Security"},{"key":"72","article-title":"The CRIME attack","author":"rizzo","year":"2012","journal-title":"Ekoparty"},{"key":"8","article-title":"Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1","author":"bleichenbacher","year":"1996","journal-title":"Crypto"},{"key":"73","article-title":"A symbolic execution framework for Java Script","author":"saxena","year":"2010","journal-title":"S&P"},{"key":"74","article-title":"CUTE: A concolic unit testing engine for C","author":"sen","year":"2005","journal-title":"FSE"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1145\/331960.331965"},{"key":"76","article-title":"A security policy oracle: Detecting security holes using multiple API implementations","author":"srivastava","year":"2011","journal-title":"PLDI"},{"key":"59","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"mckeeman","year":"1998","journal-title":"Digital Technical Journal"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/52.56422"},{"key":"57","author":"marlinspike","year":"2009","journal-title":"Null Prefix Attacks Against SSL\/TLS Certificates"},{"key":"56","author":"marlinspike","year":"2009","journal-title":"New Tricks for Defeating Ssl in Practice"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23305"},{"key":"55","author":"marlinspike","year":"2009","journal-title":"More Tricks for Defeating SSL in Practice"},{"key":"17","year":"2011","journal-title":"Comodo Report of Incident"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287651"},{"key":"15","article-title":"A simple and practical approach to unit testing: The JML and JUnit way","author":"cheon","year":"2002","journal-title":"ECOOP"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"13","article-title":"Korat: Automated testing based on Java predicates","author":"chandrasekhar","year":"2002","journal-title":"ISSTA"},{"key":"14","author":"chen","year":"1998","journal-title":"Metamorphic Testing A New Approach for Generating next Test Cases"},{"key":"11","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"OSDI"},{"key":"12","article-title":"Execution generated test cases: How to make systems code crash itself","author":"cadar","year":"2005","journal-title":"SPIN"},{"key":"21","article-title":"Origin-bound certificates: A fresh approach to strong client authentication for the Web","author":"dietz","year":"2012","journal-title":"Usenix Security"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919107"},{"key":"64","year":"1999","journal-title":"The TLS Protocol"},{"key":"65","year":"1999","journal-title":"Internet X 509 public key infrastructure certificate policy and certification practices framework"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1007\/BF01932308"},{"key":"63","article-title":"Practical, low-effort equivalence verification of real code","author":"ramos","year":"2011","journal-title":"CAV"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23036"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"49","author":"langley","year":"2014","journal-title":"Apple's SSL\/TLS Bug"},{"key":"48","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/11754008_2","article-title":"Controllable combinatorial coverage in grammar-based testing","author":"lammel","year":"2006","journal-title":"Testing of Communicating Systems"},{"key":"45","article-title":"Generalized symbolic execution for model checking and testing","author":"khurshid","year":"2003","journal-title":"TACAS"},{"key":"44","article-title":"PKI layer cake: New collision attacks against the global X.509 infrastructure","author":"kaminsky","year":"2010","journal-title":"FC"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"10","article-title":"Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation","author":"brumley","year":"2007","journal-title":"Usenix Security"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"52","article-title":"An interpretation of Purdom's algorithm for automatic generation of test cases","author":"malloy","year":"2001","journal-title":"icis"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989787"},{"key":"54","author":"marlinspike","year":"2002","journal-title":"IE SSL Vulnerability"},{"key":"50","author":"lenstra","year":"2012","journal-title":"Ron Was Wrong Whit Is Right"}],"event":{"name":"2014 IEEE Symposium on Security and Privacy (SP)","location":"San Jose, CA","start":{"date-parts":[[2014,5,18]]},"end":{"date-parts":[[2014,5,21]]}},"container-title":["2014 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6954656\/6956545\/06956560.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954656\/6956545\/06956560.pdf?arnumber=6956560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:58:58Z","timestamp":1498179538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":79,"URL":"https:\/\/doi.org\/10.1109\/sp.2014.15","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}