This course aims to educate learners on the vulnerabilities in the Public Key Infrastructure (PKI) caused by Border Gateway Protocol (BGP) attacks. The learning outcomes include understanding how adversaries can exploit BGP to obtain bogus certificates and proposing countermeasures to secure the PKI. The course teaches skills such as analyzing BGP attacks, collecting certificate datasets, and evaluating security countermeasures. The teaching method involves a rigorous analysis of attacks, real-world demonstrations, and proposing solutions. The intended audience for this course includes cybersecurity professionals, network engineers, and individuals interested in PKI security.
Overview
Syllabus
USENIX Security '18 - Bamboozling Certificate Authorities with BGP
Taught by
USENIX