A scanning tool for PC root public key stores
dc.contributor.author | Alsaid, Adil | |
dc.contributor.author | Mitchell, Chris J. | |
dc.contributor.editor | Wulf, Christopher | |
dc.contributor.editor | Lucks, Stefan | |
dc.contributor.editor | Yau, Po-Wah | |
dc.date.accessioned | 2019-08-26T12:42:21Z | |
dc.date.available | 2019-08-26T12:42:21Z | |
dc.date.issued | 2005 | |
dc.description.abstract | As has recently been demonstrated, a malicious third party could insert a self-issued CA public key into the list of trusted root CA public keys stored on an end user PC. As a consequence, the malicious third party could potentially do severe damage to the end user computing environment. In this paper, we discuss the problem of fake root public keys and suggest a solution that can be used to detect and remove them. We further describe a prototype implementation of this solution. | en |
dc.identifier.isbn | 3-88579-403-9 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/24849 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | WEWoRC 2005 – Western European Workshop on Research in Cryptology | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-74 | |
dc.title | A scanning tool for PC root public key stores | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 52 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 45 | |
gi.conference.date | 5.-7. July 2005 | |
gi.conference.location | Leuven, Belgium | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1