{"id":"https://openalex.org/W3194843666","doi":"https://doi.org/10.1109/ict52184.2021.9511513","title":"Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild","display_name":"Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3194843666","doi":"https://doi.org/10.1109/ict52184.2021.9511513","mag":"3194843666"},"language":"en","primary_location":{"id":"doi:10.1109/ict52184.2021.9511513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict52184.2021.9511513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078890978","display_name":"Wei Xia","orcid":"https://orcid.org/0000-0003-2108-0807"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Xia","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075026076","display_name":"Mingxin Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingxin Cui","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109361586","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-9679-9480"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102999591","display_name":"Yangyang Guan","orcid":"https://orcid.org/0000-0002-8215-135X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yangyang Guan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100448267","display_name":"Zhenzhen Li","orcid":"https://orcid.org/0000-0002-0566-3562"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenzhen Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100332597","display_name":"Zhen Li","orcid":"https://orcid.org/0000-0002-4033-8650"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115601598","display_name":"Gang Xiong","orcid":"https://orcid.org/0000-0002-3190-6521"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xiong","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5078890978"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6094,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6673428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.8372787833213806},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7501541972160339},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6893535852432251},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5754197835922241},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.5450847148895264},{"id":"https://openalex.org/keywords/root-certificate","display_name":"Root certificate","score":0.5294275879859924},{"id":"https://openalex.org/keywords/public-key-certificate","display_name":"Public key certificate","score":0.5174822807312012},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.5160436630249023},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4827934503555298},{"id":"https://openalex.org/keywords/server-side","display_name":"Server-side","score":0.4164118766784668},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40844887495040894},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3708003759384155},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2520669400691986},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09461849927902222}],"concepts":[{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.8372787833213806},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7501541972160339},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6893535852432251},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5754197835922241},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5450847148895264},{"id":"https://openalex.org/C62057728","wikidata":"https://www.wikidata.org/wiki/Q7366568","display_name":"Root certificate","level":5,"score":0.5294275879859924},{"id":"https://openalex.org/C167529545","wikidata":"https://www.wikidata.org/wiki/Q274758","display_name":"Public key certificate","level":4,"score":0.5174822807312012},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.5160436630249023},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4827934503555298},{"id":"https://openalex.org/C14414571","wikidata":"https://www.wikidata.org/wiki/Q519081","display_name":"Server-side","level":2,"score":0.4164118766784668},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40844887495040894},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3708003759384155},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2520669400691986},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09461849927902222},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ict52184.2021.9511513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict52184.2021.9511513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 28th International Conference on Telecommunications (ICT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[{"id":"https://openalex.org/G2771372968","display_name":null,"funder_award_id":"2018YFB1800200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1987283229","https://openalex.org/W2046015955","https://openalex.org/W2104899073","https://openalex.org/W2114398364","https://openalex.org/W2130867912","https://openalex.org/W2285910409","https://openalex.org/W2550748725","https://openalex.org/W2552873532","https://openalex.org/W2745118957","https://openalex.org/W2888934989","https://openalex.org/W2915352631","https://openalex.org/W6677217071"],"related_works":["https://openalex.org/W2596139382","https://openalex.org/W2914672392","https://openalex.org/W4312444180","https://openalex.org/W4210686566","https://openalex.org/W2096905199","https://openalex.org/W2025476074","https://openalex.org/W2113386121","https://openalex.org/W2610396733","https://openalex.org/W2565121009","https://openalex.org/W3108079065"],"abstract_inverted_index":{"Client":[0],"certificate":[1,89,163,207,214],"authentication":[2],"(CCA)":[3],"is":[4,41,45,53],"gaining":[5],"greater":[6],"significance,":[7],"as":[8,91,108],"more":[9,11],"and":[10,18,67,134,149,165,170,188,209],"security-critical":[12],"private":[13],"activities":[14],"such":[15],"like":[16],"e-bank":[17],"e-health":[19],"are":[20],"being":[21],"conducted":[22],"online,":[23],"posing":[24],"strong":[25],"needs":[26],"for":[27],"mutual":[28],"authentication.":[29,151],"Unlike":[30],"server":[31,171],"certificates,":[32,184],"active":[33],"measurement":[34,52,100],"of":[35,86,94,101,132,156,178,204,219],"client":[36,88,102,112,137,157,169,183,206],"certificates":[37,103,113,138,158],"via":[38],"probing":[39],"techniques":[40],"infeasible":[42],"since":[43],"CCA":[44,133],"non-mandatory":[46],"in":[47,104,122,216],"the":[48,75,87,92,97,118,129,136,154,162,176,186,189,197,205],"TLS":[49],"protocol.":[50],"Passive":[51],"technically":[54],"feasible":[55],"but":[56],"requires":[57],"consistent":[58],"access":[59],"to":[60,64,143,161],"large-scale":[61],"Internet":[62],"traffic":[63],"be":[65],"comprehensive":[66,84],"convincing,":[68],"which":[69],"puts":[70],"very":[71],"high":[72],"requirements":[73],"on":[74,213],"research":[76],"conditions.":[77],"In":[78],"this":[79],"paper,":[80],"we":[81],"present":[82],"a":[83],"study":[85],"ecosystem,":[90],"outcome":[93],"by":[95,182,199],"far":[96],"largest":[98],"passive":[99],"literature.":[105],"As":[106],"many":[107],"97":[109],"million":[110],"unique":[111],"have":[114],"been":[115],"collected":[116],"from":[117],"top-level":[119],"academic":[120],"network":[121],"China":[123],"during":[124],"six":[125],"months.":[126],"We":[127,152,173,191],"analyze":[128],"actual":[130],"use":[131],"classify":[135],"into":[139],"three":[140],"categories":[141],"according":[142],"purposes:":[144],"device":[145],"authentication,":[146,148],"user":[147],"application":[150],"discuss":[153],"security":[155],"with":[159],"respect":[160],"attributes":[164],"make":[166],"comparisons":[167],"between":[168],"certificates.":[172],"also":[174],"evaluate":[175],"risk":[177],"privacy":[179],"leakage":[180],"caused":[181],"indicating":[185],"severity":[187],"culprit.":[190],"hope":[192],"our":[193],"work":[194],"would":[195],"benefit":[196],"community":[198],"depicting":[200],"an":[201],"intuitive":[202],"overview":[203],"ecosystem":[208],"inspiring":[210],"new":[211],"thoughts":[212],"usage":[215],"all":[217],"kinds":[218],"scenarios.":[220]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
