Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Brigham Young University

2016

Security

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

The State Of Man-In-The-Middle Tls Proxies: Prevalence And User Attitudes, Mark Thomas Oneill Oct 2016

The State Of Man-In-The-Middle Tls Proxies: Prevalence And User Attitudes, Mark Thomas Oneill

Theses and Dissertations

We measure the prevalence and uses of Man-in-the-Middle TLS proxies using a Flash tool deployed with a Google AdWords campaign. We generate 15.2 million certificate tests across two large-scale measurement studies and find that 1 in 250 TLS connections are intercepted by proxies. The majority of these proxies appear to be benevolent, however we identify over 3,600 cases where eight malware products are using this technology nefariously. We also find thousands of instances of negligent, duplicitous, and suspicious behavior, some of which degrade security for users without their knowledge. Distinguishing these types of practices is challenging in practice, indicating a …


Usable, Secure Content-Based Encryption On The Web, Scott Ruoti Jul 2016

Usable, Secure Content-Based Encryption On The Web, Scott Ruoti

Theses and Dissertations

Users share private information on the web through a variety of applications, such as email, instant messaging, social media, and document sharing. Unfortunately, recent revelations have shown that not only is users' data at risk from hackers and malicious insiders, but also from government surveillance. This state of affairs motivates the need for users to be able to encrypt their online data.In this dissertation, we explore how to help users encrypt their online data, with a special focus on securing email. First, we explore the design principles that are necessary to create usable, secure email. As part of this exploration, …