1. B. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Scott-Railton, R. Deibert and V. Paxson, An analysis of China’s “Great Cannon”, in: Fifth USENIX Workshop on Free and Open Comms. on the Internet (FOCI 15), 2015.
2. C. Soghoian and S. Stamm, Certified lies: Detecting and defeating government interception attacks against SSL (short paper), in: Proc. of the 16th International Conference on Financial Cryptography and Data Security (FC ’12), 2012.
3. N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar and Y. Shavitt, DROWN: Breaking TLS using SSLv2, in: 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 689–706.
4. Z. Durumeric, Z. Ma, D. Springall, R. Barnes, N. Sullivan, E. Bursztein, M. Bailey, J.A. Halderman and V. Paxson, The security impact of HTTPS interception, in: Proc. of Network and Distributed System Security Symposium (NDSS), 2016, pp. 689–706.
5. S. Torres-Arias, A.K. Ammula, R. Curtmola and J. Cappos, On omitting commits and committing omissions: Preventing Git metadata tampering that (re)introduces software vulnerabilities, in: 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 379–395.