C. Applied and . Hardening, Online at https://bettercrypto.org, 2015.

A. Internet and I. , Top 1,000,000 sites

B. Amann, R. Sommer, M. Vallentin, and S. Hall, No attack necessary, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.179-188, 2013.
DOI : 10.1145/2523649.2523665

B. Amann, M. Vallentin, S. Hall, and R. Sommer, Revisiting SSL: A Large-Scale Study of the Internet's Most Trusted Protocol, 2012.

N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel et al., DROWN: Breaking TLS using SSLv2, 25th USENIX Security Symposium, 2016.

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), p.6176, 2008.
DOI : 10.17487/rfc4346

Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman, A Search Engine Backed by Internet-Wide Scanning, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.542-553, 2015.
DOI : 10.14722/ndss.2015.23162

Z. Durumeric, J. Kasten, M. Bailey, and J. A. Halderman, Analysis of the HTTPS certificate ecosystem, Proceedings of the 2013 conference on Internet measurement conference, IMC '13, pp.291-304, 2013.
DOI : 10.1145/2504730.2504755

Z. Durumeric, F. Li, J. Kasten, J. Amann, J. Beekman et al., The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, 2014.
DOI : 10.1145/2663716.2663755

Z. Durumeric, E. Wustrow, and J. A. Halderman, ZMap: Fast Internet-wide Scanning and Its Security Applications, 22nd USENIX Security Symposium, 2013.

P. Eckersley, J. R. Burns-13, and . Graham, An Observatory for the SSLiverse Masscan: the entire Internet in 3 minutes. https:// github.com/robertdavidgraham/masscan, DEF CON, vol.18, 2010.

R. Holz, J. Amann, O. Mehani, M. Wachs, and M. A. Kaafar, TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication, Proceedings 2016 Network and Distributed System Security Symposium, 2016.
DOI : 10.14722/ndss.2016.23055

L. Huang, S. Adhikarla, D. Boneh, and C. Jackson, An Experimental Study of TLS Forward Secrecy Deployments, IEEE Internet Computing, vol.18, issue.6, pp.1843-51, 2014.
DOI : 10.1109/MIC.2014.86

URL : http://www.w2spconf.com/2014/papers/TLS.pdf

D. Hubbard, Cisco Umbrella 1 Million, 2016.

H. K. Lee, T. Malkin, and E. Nahum, Cryptographic strength of ssl/tls servers, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, pp.83-92, 2007.
DOI : 10.1145/1298306.1298318

W. Mayer, A. Zauner, M. Schmiedecker, and M. Huber, No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large, 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016.
DOI : 10.1109/ARES.2016.11

. Mozilla, Mozilla SSL Configuration Generator. https://mozilla.github.io/ server-side-tls/ssl-config-generator

A. Popov, Prohibiting RC4 Cipher Suites, Feb
DOI : 10.17487/rfc7465

S. Qualys and . Labs, SSL Server Test

E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.3 draft-ietf- tls-tls13-18, 2016.

Y. Sheffer, R. Holz, and P. Saint-andre, Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security, p.2015
DOI : 10.17487/RFC7525

B. Van-der-sloot, J. Amann, M. Bernhard, Z. Durumeric, M. Bailey et al., Towards a Complete View of the Certificate Ecosystem, Internet Measurement Conference, pp.543-549, 2016.