【24h】

Installing Fake Root Keys in a PC

机译:在PC中安装伪根密钥

获取原文
获取原文并翻译 | 示例

摘要

If a malicious party can insert a self-issued CA public key into the list of root public keys stored in a PC, then this party could potentially do considerable harm to that PC. In this paper, we present a way to achieve such an attack for the Internet Explorer web browser root key store, which avoids attracting the user's attention. A realisation of this attack is also described. Finally, countermeasures that can be deployed to prevent such an attack are outlined.
机译:如果恶意方可以将自行发布的CA公共密钥插入存储在PC中的根公共密钥列表中,则该恶意方可能对该PC造成相当大的损害。在本文中,我们提出了一种对Internet Explorer Web浏览器根密钥存储区进行这种攻击的方法,该方法可以避免引起用户的注意。还描述了这种攻击的实现。最后,概述了可以用来防止此类攻击的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号