YoVDO

Bamboozling Certificate Authorities with BGP

Offered By: USENIX via YouTube

Tags

USENIX Security Courses Cybersecurity Courses Network Engineering Courses

Course Description

Overview

Explore a critical security vulnerability in the Public Key Infrastructure (PKI) through this 23-minute conference talk from USENIX Security '18. Discover how Autonomous Systems can exploit Border Gateway Protocol (BGP) weaknesses to hijack traffic and obtain fraudulent certificates from trusted Certificate Authorities. Learn about the first real-world demonstration of these attacks, conducted ethically against top CAs. Examine findings from a dataset of 1.8 million certificates, revealing the widespread vulnerability of domains to such exploits. Gain insights into two proposed countermeasures: multi-vantage point domain verification by CAs and a BGP monitoring system to detect suspicious routes and delay certificate issuance. Understand the implications for network security and the steps being taken to strengthen the PKI against these threats.

Syllabus

USENIX Security '18 - Bamboozling Certificate Authorities with BGP


Taught by

USENIX

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network