The SSL man-in-the-middle attack uses forged SSL certificates to intercept encrypted connections between clients and servers. However, due to a lack of reliable indicators, it is still unclear how commonplace these attacks occur in the wild. In this work, we have designed and implemented a method to detect the occurrence of SSL man-in-the-middle attack on a… (More)
Acknowledgements Foremost, I am profoundly indepted to Collin Jackson, who introduced me to browser security research and provided incredible guidance and support during my time at Carnegie Mellon University. I owe a great debt of gratitude to my thesis committee, collaborated with me on the research described in this thesis. I would like to thank my… (More)
We give the complete list of possible torsion subgroups of elliptic curves with complex multiplication over number fields of degree 1-13. Additionally we describe the algorithm used to compute these torsion subgroups and its implementation.