Back to Results
First PageMeta Content
Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Security breaches / Certificate authority / X.509 / Public key certificate / Chain of trust / Code signing / Malware


Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications Omar Alrawi Aziz Mohaisen
Add to Reading List

Document Date: 2017-10-04 00:41:27


Open Document

File Size: 762,05 KB

Share Result on Facebook