Abstract
It all starts with Trust Stores. Booting in to a trusted OS, managing sensitive information, establishing a secure channel for Communication across the networks or any transaction involving PKI.
Lets try and understand more about the Trust Stores, how do they work, how malwares and attackers (can) use different ways to manipulate the Trust Stores & what we can do to detect and secure such attempts.