Results (
Thai) 1:
[Copy]Copied!
These techniques have significant limitations, such as the need of a secure bootstrap procedure, or pinningrequiring some host-by-host basis.This study proposes an evolution from pinning-in-the-host to pinning-in-the-net, by enablingmechanisms to validate certificates as they travel through a given network. Certificates wouldbe classifi ed as trusted or not trusted as a result of cross-information obtained from differentsources. This would result in early detection of suspicious certifi cates and would triggermechanisms to defeat the attack; minimize its impact; and gather information on the attackers.Additionally, a more detailed and thorough analysis could be performed.
Being translated, please wait..
