TLS hardening
E Dreyfus - arXiv preprint arXiv:1407.2168, 2014 - arxiv.org
… 2 TLS Configuration hardening in practice: Apache We will now look at how to harden TLS
configuration for a few services: Apache, Sendmail, Dovecot, OpenVPN... Since we talk about …
configuration for a few services: Apache, Sendmail, Dovecot, OpenVPN... Since we talk about …
Practical password hardening based on TLS
C Diomedous, E Athanasopoulos - … on Detection of Intrusions and Malware …, 2019 - Springer
… is serviced through TLS capable of strongly hardening their passwords. We observe that any
TLS-… We modify mod_ssl, the module that offers TLS to any Apache web server, to act as a …
TLS-… We modify mod_ssl, the module that offers TLS to any Apache web server, to act as a …
[BOOK][B] Linux hardening in hostile networks: Server security from TLS to Tor
K Rankin - 2017 - books.google.com
… with TLS. Instead of bogging you down with the details of how TLS works in almost every
chapter, I’ve put those details here as a quick reference in case you are curious about how TLS …
chapter, I’ve put those details here as a quick reference in case you are curious about how TLS …
On the security of the TLS protocol: A systematic analysis
… In view of its importance, TLS has long been the subject of intense research analysis, … to
establish to what extent the TLS Handshake Protocol and the TLS Record Protocol are secure, …
establish to what extent the TLS Handshake Protocol and the TLS Record Protocol are secure, …
Hardening A Web Server Infrastructure: An Applied Study of TLS, Reverse Proxy Security, and Attack Simulations
AB Fazlu Rahman - 2025 - theseus.fi
… 70.1% supported TLS 1.3, while 99.9% still supported TLS 1.2, demonstrating … TLS 1.2 and
TLS 1.3. However, considering findings of the study, the analysis will primarily focus on TLS …
TLS 1.3. However, considering findings of the study, the analysis will primarily focus on TLS …
X-Ray-TLS: transparent decryption of TLS sessions by extracting session keys from memory
… We present X-Ray-TLS, a new target-agnostic TLS decryption method … TLS hardening,
such as certificate pinning and perfect forward secrecy. We benchmark X-Ray-TLS on major TLS …
such as certificate pinning and perfect forward secrecy. We benchmark X-Ray-TLS on major TLS …
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
… rely too naively on TLS. We present new client impersonation attacks against TLS renegotiations,
… We also demonstrate new ways to exploit known weaknesses of HTTP over TLS. We …
… We also demonstrate new ways to exploit known weaknesses of HTTP over TLS. We …
TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications
D Diaz-Sanchez, A Marín-Lopez… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
… privacy, this article deals with the current state of TLS and the involved PKI usage for accessing
online services by IoT devices. The reason for analysing TLS is that this is the only end-to…
online services by IoT devices. The reason for analysing TLS is that this is the only end-to…
Lost in tls? no more! assisted deployment of secure TLS configurations
… used in a TLS suite and their relative weaknesses. For these reasons, many different tools
have been developed to verify TLS implementations. However, they usually analyze the TLS …
have been developed to verify TLS implementations. However, they usually analyze the TLS …
Hardening cryptographic operations through the use of secure enclaves
A Brandão, JS Resende, R Martins - Computers & Security, 2021 - Elsevier
… Given the importance of web servers and their inherent greater exposure to attacks, we
explore the hardening of Apache web server through the use of secure enclaves. This was …
explore the hardening of Apache web server through the use of secure enclaves. This was …