Hackers of India

Getting into the Trust Store We Trust

By  Ajit Hatti  on 07 Aug 2015 @ Defcon : Crypto&privacy Village

Abstract

It all starts with Trust Stores. Booting in to a trusted OS, managing sensitive information, establishing a secure channel for Communication across the networks or any transaction involving PKI.

Lets try and understand more about the Trust Stores, how do they work, how malwares and attackers (can) use different ways to manipulate the Trust Stores & what we can do to detect and secure such attempts.