Logo des Repositoriums
 

A scanning tool for PC root public key stores

dc.contributor.authorAlsaid, Adil
dc.contributor.authorMitchell, Chris J.
dc.contributor.editorWulf, Christopher
dc.contributor.editorLucks, Stefan
dc.contributor.editorYau, Po-Wah
dc.date.accessioned2019-08-26T12:42:21Z
dc.date.available2019-08-26T12:42:21Z
dc.date.issued2005
dc.description.abstractAs has recently been demonstrated, a malicious third party could insert a self-issued CA public key into the list of trusted root CA public keys stored on an end user PC. As a consequence, the malicious third party could potentially do severe damage to the end user computing environment. In this paper, we discuss the problem of fake root public keys and suggest a solution that can be used to detect and remove them. We further describe a prototype implementation of this solution.en
dc.identifier.isbn3-88579-403-9
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/24849
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofWEWoRC 2005 – Western European Workshop on Research in Cryptology
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-74
dc.titleA scanning tool for PC root public key storesen
dc.typeText/Conference Paper
gi.citation.endPage52
gi.citation.publisherPlaceBonn
gi.citation.startPage45
gi.conference.date5.-7. July 2005
gi.conference.locationLeuven, Belgium
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Edition74.-5.pdf
Größe:
183.84 KB
Format:
Adobe Portable Document Format