{"id":"https://openalex.org/W4415222205","doi":"https://doi.org/10.1145/3730567.3732916","title":"Unraveling the Complexities of MTA-STS Deployment and Management in Securing Email","display_name":"Unraveling the Complexities of MTA-STS Deployment and Management in Securing Email","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W4415222205","doi":"https://doi.org/10.1145/3730567.3732916"},"language":"en","primary_location":{"id":"doi:10.1145/3730567.3732916","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3732916","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3730567.3732916","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3730567.3732916","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011946913","display_name":"Md. Ishtiaq Ashiq","orcid":"https://orcid.org/0000-0001-8282-6225"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md. Ishtiaq Ashiq","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"raw_orcid":"https://orcid.org/0000-0001-8282-6225","affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067666349","display_name":"Tobias Fiebig","orcid":"https://orcid.org/0000-0002-0163-5134"},"institutions":[{"id":"https://openalex.org/I4210109712","display_name":"Max Planck Institute for Informatics","ror":"https://ror.org/01w19ak89","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210109712"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tobias Fiebig","raw_affiliation_strings":["Max-Planck Institute for Informatics, Saarbruecken, Germany"],"raw_orcid":"https://orcid.org/0000-0002-0163-5134","affiliations":[{"raw_affiliation_string":"Max-Planck Institute for Informatics, Saarbruecken, Germany","institution_ids":["https://openalex.org/I4210109712"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055808802","display_name":"Taejoong Chung","orcid":"https://orcid.org/0000-0002-4323-4080"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taejoong Chung","raw_affiliation_strings":["Virginia Tech, Blacksburg, VA, USA"],"raw_orcid":"https://orcid.org/0000-0002-4323-4080","affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011946913"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27277976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6700999736785889},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6421999931335449},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5353999733924866},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5289999842643738},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.46700000762939453},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.3621000051498413}],"concepts":[{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6700999736785889},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6421999931335449},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.59170001745224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5565999746322632},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5353999733924866},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5289999842643738},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5012999773025513},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.46700000762939453},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40070000290870667},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3984000086784363},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.35269999504089355},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.32899999618530273},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.3190999925136566},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.265500009059906}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3730567.3732916","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3732916","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3730567.3732916","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:vtechworks.lib.vt.edu:10919/138847","is_oa":true,"landing_page_url":"https://hdl.handle.net/10919/138847","pdf_url":null,"source":{"id":"https://openalex.org/S4306400248","display_name":"VTechWorks (Virginia Tech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I859038795","host_organization_name":"Virginia Tech","host_organization_lineage":["https://openalex.org/I859038795"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1145/3730567.3732916","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3732916","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3730567.3732916","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6736819638","display_name":"CAREER: Securing and Evolving Internet Security Protocols for Naming and Routing","funder_award_id":"2339378","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7549462037","display_name":null,"funder_award_id":"CNS-2339378","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415222205.pdf","grobid_xml":"https://content.openalex.org/works/W4415222205.grobid-xml"},"referenced_works_count":2,"referenced_works":["https://openalex.org/W2621107674","https://openalex.org/W4315746341"],"related_works":[],"abstract_inverted_index":{"Email":[0],"has":[1,16,53,89],"been":[2,54,90],"a":[3,76,107,120,151,163,231],"cornerstone":[4],"of":[5,13,44,111,141,166,179,186,193,220,251],"online":[6],"communication":[7],"for":[8,233,238],"decades,":[9],"but":[10,253],"its":[11,86,158,260],"lack":[12],"built-in":[14],"confidentiality":[15],"left":[17],"it":[18,66],"vulnerable":[19],"to":[20],"various":[21],"attacks.":[22],"To":[23,204],"address":[24],"this":[25,103],"issue,":[26],"two":[27],"key":[28],"protocols":[29],"are":[30],"being":[31],"used:":[32],"MTA-STS":[33,52,95,113,155,171,183,201,221,252],"(Mail":[34],"Transfer":[35],"Agent":[36],"Strict":[37],"Transport":[38],"Security)":[39],"and":[40,63,81,98,157,168,230,262],"DANE":[41,48,234],"(DNS-based":[42],"Authentication":[43],"Named":[45],"Entities).":[46],"While":[47,218],"was":[49,222],"introduced":[50],"first,":[51],"actively":[55],"adopted":[56],"by":[57,211],"major":[58],"email":[59,197,212],"providers":[60],"like":[61],"Google":[62],"Microsoft,":[64],"as":[65,146,236],"does":[67],"not":[68,239,245],"require":[69],"the":[70,112,208,241,248,256],"complex":[71],"DNSSEC":[72],"chain":[73],"that":[74],"poses":[75],"significant":[77,257],"challenge":[78],"in":[79,100,170,259],"deploying":[80,240],"managing":[82],"DANE.":[83],"However,":[84],"despite":[85],"significance,":[87],"there":[88],"limited":[91],"research":[92],"on":[93,119,154],"how":[94],"is":[96],"deployed":[97],"managed":[99],"practice.":[101],"In":[102,173],"study,":[104],"we":[105,214],"present":[106],"thorough,":[108],"longitudinal":[109],"investigation":[110],"ecosystem.":[114],"We":[115],"base":[116],"our":[117,174],"analysis":[118,161],"dataset":[121],"capturing":[122],"over":[123,134],"87":[124],"million":[125],"domains":[126,181,187],"from":[127,200],"DNS":[128],"scans":[129],"collected":[130],"across":[131],"four":[132],"TLDs":[133],"31":[135],"months,":[136],"along":[137],"with":[138,182],"10":[139],"months":[140],"additional":[142],"component":[143],"scanning":[144],"such":[145],"TLS":[147],"certificates,":[148],"thereby":[149],"offering":[150],"broad":[152],"perspective":[153],"adoption":[156],"management.":[159,263],"Our":[160,243],"uncovers":[162],"concerning":[164],"trend":[165],"misconfigurations":[167],"inconsistencies":[169],"setups.":[172],"most":[175],"recent":[176],"snapshot,":[177],"out":[178],"~68K":[180],"record,":[184],"29.6%":[185],"were":[188],"incorrectly":[189],"configured,":[190],"while":[191],"3.2%":[192],"these":[194],"should":[195],"encounter":[196],"delivery":[198],"failure":[199],"supporting":[202],"senders.":[203],"gain":[205],"insights":[206],"into":[207],"challenges":[209,258],"faced":[210],"administrators,":[213],"surveyed":[215],"117":[216],"operators.":[217],"awareness":[219],"high":[223],"(94.7%),":[224],"many":[225],"cited":[226],"operational":[227],"complexity":[228],"(48.8%)":[229],"preference":[232],"(45.4%)":[235],"reasons":[237],"protocol.":[242],"study":[244],"only":[246],"highlights":[247],"growing":[249],"importance":[250],"also":[254],"reveals":[255],"deployment":[261]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-16T00:00:00"}
