SLIDE 14 Chair of Network Architectures and Services Technical University of Munich
Bibliography I
[1] J. Czyz, M. Luckie, M. Allman, and M. Bailey. Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In Network and Distributed System Security Symposium, Feb. 2016. [2] Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-wide Scanning and Its Security Applications. In Usenix Security, volume 2013, 2013. [3] O. Gasser, Q. Scheitle, S. Gebhard, and G. Carle. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In 8th Int. Workshop on Traffic Monitoring and Analysis, 2016. [4] Google. Ipv6 adpoption. Technical report, Google, https://www.google.com/intl/en/ipv6/statistics.html, 2016. [5] R. Holz, L. Braun, N. Kammenhuber, and G. Carle. The SSL Landscape: A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 427–444. ACM, 2011. [6] IHK. Pk tls-check. Technical report, IHK, 2016. [7] M. Stevens, P . Karpman, and T. Peyrin. Freestart collision for full sha-1. Cryptology ePrint Archive, Report 2015/967, 2015.
Pirmin Blanz – IPv6 TLS Security Scanning 14