Certifiably Vulnerable: Using Certificate Transparency Logs for Target Reconnaissance | IEEE Conference Publication | IEEE Xplore