Gesellschaft fr Informatik e.V.

Lecture Notes in Informatics


WEWoRC 2005 -Western European Workshop on Research in Cryptology P-74, 45-52 (2005).

Gesellschaft für Informatik, Bonn
2005


Editors

Christopher Wolf, Stefan Lucks, Po-Wah Yau (eds.)


Copyright © Gesellschaft für Informatik, Bonn

Contents

A scanning tool for PC root public key stores

Adil Alsaid and Chris J. Mitchell

Abstract


As has recently been demonstrated, a malicious third party could insert a self-issued CA public key into the list of trusted root CA public keys stored on an end user PC. As a consequence, the malicious third party could potentially do severe damage to the end user computing environment. In this paper, we discuss the problem of fake root public keys and suggest a solution that can be used to detect and remove them. We further describe a prototype implementation of this solution. C. Wolf, S. Lucks, P.-W. Yau (Eds.): WEWoRC 2005, LNI P-74, pp. 45-52, 2005. c Gesellschaft für Informatik e.V.


Full Text: PDF

Gesellschaft für Informatik, Bonn
ISBN 3-88579-403-9


Last changed 24.01.2012 21:52:36