%0 Conference Proceedings %T Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations %+ Security & Trust Research Unit [Trento] %+ Università degli Studi di Trento = University of Trento (UNITN) %A Manfredi, Salvatore %A Ranise, Silvio %A Sciarretta, Giada %Z Part 4: Security Protocol Practices %< avec comité de lecture %( Lecture Notes in Computer Science %B 33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Charleston, SC, United States %Y Simon N. Foley %I Springer International Publishing %3 Data and Applications Security and Privacy XXXIII %V LNCS-11559 %P 201-220 %8 2019-07-15 %D 2019 %R 10.1007/978-3-030-22479-0_11 %K TLS misconfiguration %K Vulnerability detection %K Assisted mitigations %Z Computer Science [cs]Conference papers %X Over the last few years, there has been an almost exponential growth of TLS popularity and usage, especially among applications that deal with sensitive data. However, even with this widespread use, TLS remains for many system administrators a complex subject. The main reason is that they do not have the time to understand all the cryptographic algorithms and features used in a TLS suite and their relative weaknesses. For these reasons, many different tools have been developed to verify TLS implementations. However, they usually analyze the TLS configuration and provide a list of possible attacks, without specifying their mitigations. In this paper, we present TLSAssistant, a fully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-02384588/document %2 https://inria.hal.science/hal-02384588/file/480962_1_En_11_Chapter.pdf %L hal-02384588 %U https://inria.hal.science/hal-02384588 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-11559