Security

Trust Coercion in the Name of Usable Public Key Infrastructure

Free registration required

Executive Summary

The authors are currently witnessing an alarmingly increasing array of attacks on secure infrastructures used for industrial and commercial purposes. The success of these attacks has relied heavily on an innovative stratagem. This stratagem makes use of digital certificates to devise malicious code or servers as trustworthy, ultimately deceiving end users. This has led to an escalating demand for forged or stolen valid digital certificates on the electronic black market. Certification Authorities (CA) themselves are now coming under fire.

  • Format: PDF
  • Size: 684.85 KB