extensions. RFC 3546, RFC Editor. Accessed: 2021-
02-12.
CA/Browser Forum (2020). Baseline requirements for the
issuance and management of publicly-trusted certifi-
cates (version 1.7.3). Technical report, CA/B Forum.
Accessed: 2021-02-08.
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Hous-
ley, R., and Polk, W. (2008). Internet X.509 Pub-
lic Key Infrastructure Certificate and Certificate Re-
vocation List (CRL) Profile. RFC 5280, RFC Editor.
http://www.rfc-editor.org/rfc/rfc5280.txt.
Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., and Hal-
derman, J. A. (2015). A search engine backed by
internet-wide scanning. In Proceedings of the 22nd
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 542–553. ACM.
Fasllija, E., Enis¸er, H. F., and Pr
¨
unster, B. (2019). Phish-
hook: Detecting phishing certificates using certificate
transparency logs. In Lecture Notes of the Institute for
Computer Sciences, Social Informatics and Telecom-
munications Engineering, pages 320–334. Springer
International Publishing.
Hao, S., Kantchelian, A., Miller, B., Paxson, V., and
Feamster, N. (2016). PREDATOR: Proactive Recog-
nition and Elimination of Domain Abuse at Time-
Of-Registration. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communica-
tions Security, pages 1568–1579. ACM.
Hao, S., Thomas, M., Paxson, V., Feamster, N., Kreibich,
C., Grier, C., and Hollenbeck, S. (2013). Under-
standing the domain registration behavior of spam-
mers. In Proceedings of the 2013 Conference on Inter-
net Measurement Conference, IMC ’13, page 63–76,
New York, NY, USA. Association for Computing Ma-
chinery.
Holz, R., Amann, J., Razaghpanah, A., and Vallina-
Rodriguez, N. (2019). The era of TLS 1.3: Measuring
deployment and use with active and passive methods.
CoRR, abs/1907.12762.
Lastdrager, E. E. (2014). Achieving a consensual defini-
tion of phishing based on a systematic review of the
literature. Crime Science, 3(1).
Lauinger, T., Chaabane, A., Buyukkayhan, A. S., Onarli-
oglu, K., and Robertson, W. (2017). Game of reg-
istrars: An empirical analysis of post-expiration do-
main name takeovers. In 26th USENIX Security Sym-
posium (USENIX Security 17), pages 865–880, Van-
couver, BC. USENIX Association.
Lever, C., Walls, R., Nadji, Y., Dagon, D., McDaniel, P.,
and Antonakakis, M. (2016). Domain-z: 28 registra-
tions later measuring the exploitation of residual trust
in domains. In 2016 IEEE Symposium on Security and
Privacy (SP), pages 691–706. IEEE.
Liu, Y., Tome, W., Zhang, L., Choffnes, D., Levin, D.,
Maggs, B., Mislove, A., Schulman, A., and Wilson,
C. (2015). An end-to-end measurement of certifi-
cate revocation in the web’s pki. In Proceedings of
the 2015 Internet Measurement Conference, IMC ’15,
page 183–196, New York, NY, USA. Association for
Computing Machinery.
Manousis, A., Ragsdale, R., Draffin, B., Agrawal, A., and
Sekar, V. (2016). Shedding light on the adoption of
let’s encrypt.
Maroofi, S., Korczynski, M., Hesselman, C., Ampeau, B.,
and Duda, A. (2020). COMAR: Classification of com-
promised versus maliciously registered domains. In
2020 IEEE European Symposium on Security and Pri-
vacy (EuroS&P). IEEE.
Moura, G. C. M., Muller, M., Wullink, M., and Hesselman,
C. (2016). nDEWS: A new domains early warning
system for TLDs. In NOMS 2016 - 2016 IEEE/I-
FIP Network Operations and Management Sympo-
sium, pages 1061–1066. IEEE.
Pochat, V. L., Goethem, T. V., Tajalizadehkhoob, S., Ko-
rczynski, M., and Joosen, W. (2019). Tranco: A
research-oriented top sites ranking hardened against
manipulation. In Proceedings 2019 Network and Dis-
tributed System Security Symposium. Internet Society.
Prins, J. (2011). DigiNotar Certificate Author-
ity breach “Operation Black Tulip”. https:
//media.threatpost.com/wp-content/uploads/sites/
103/2011/09/07061400/rapport-fox-it-operation-
black-tulip-v1-0.pdf. Accessed: 2021-02-12.
Razaghpanah, A., Niaki, A. A., Vallina-Rodriguez, N., Sun-
daresan, S., Amann, J., and Gill, P. (2017). Study-
ing TLS usage in android apps. In Proceedings of the
13th International Conference on emerging Network-
ing EXperiments and Technologies, pages 350–362.
ACM.
Sakurai, Y., Watanabe, T., Okuda, T., Akiyama, M., and
Mori, T. (2020). Discovering HTTPSified phishing
websites using the TLS certificates footprints. In 2020
IEEE European Symposium on Security and Privacy
Workshops (EuroS&PW), pages 522–531. IEEE.
Scheitle, Q., Gasser, O., Nolte, T., Amann, J., Brent, L.,
Carle, G., Holz, R., Schmidt, T. C., and W
¨
ahlisch, M.
(2018). The rise of certificate transparency and its im-
plications on the internet ecosystem. In Proceedings
of the Internet Measurement Conference 2018, IMC
’18, page 343–349, New York, NY, USA. Association
for Computing Machinery.
Thompson, C., Shelton, M., Stark, E., Walker, M.,
Schechter, E., and Felt, A. P. (2019). The web’s iden-
tity crisis: understanding the effectiveness of website
identity indicators. In 28th {USENIX} Security Sym-
posium ({USENIX} Security 19), pages 1715–1732.
VanderSloot, B., Amann, J., Bernhard, M., Durumeric, Z.,
Bailey, M., and Halderman, J. A. (2016). Towards a
complete view of the certificate ecosystem. In Pro-
ceedings of the 2016 Internet Measurement Confer-
ence, IMC ’16, page 543–549, New York, NY, USA.
Association for Computing Machinery.
Zhang, L., Choffnes, D., Levin, D., Dumitras¸, T., Mislove,
A., Schulman, A., and Wilson, C. (2014). Analysis
of ssl certificate reissues and revocations in the wake
of heartbleed. In Proceedings of the 2014 Conference
on Internet Measurement Conference, IMC ’14, page
489–502, New York, NY, USA. Association for Com-
puting Machinery.
Can a TLS Certificate Be Phishy?
49