Sign in

Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance.

Stijn PletinckxThanh-Dat NguyenTobias FiebigChristopher KruegelGiovanni Vigna
Published in: EuroS&P (2023)
Keyphrases
  • log data
  • target tracking
  • genetic algorithm
  • information systems
  • multiple targets