Getting into the Trust Store We Trust

DEF CON 23

Presented by: Ajit Hatti
Date: Friday August 07, 2015
Time: 10:30 - 11:55
Location: Crypto and Privacy Village

It all starts with Trust Stores. Booting in to a trusted OS, managing sensitive information, establishing a secure channel for Communication across the networks or any transaction involving PKI.

Lets try and understand more about the Trust Stores, how do they work, how malwares and attackers (can) use different ways to manipulate the Trust Stores & what we can do to detect and secure such attempts.

Ajit Hatti

Ajit Hatti is a Co-founder of “null -Open security community”, His work is focused on Infrastructure Security, providing Trusted Computing On Hostile Platforms & most of his papers are in social interest. Invented the widely exploited “Applanting” attack. Previously worked on secure applications of Cryptography at Symantec Corporation. He has worked as an Engineer and Security Researcher with security companies like IBM-ISS, Bulelane, Zscaler in past. He has previously presented his security research at BlackHat, NullCon, Ground Zero Summit & C0C0N


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats