Threat analysis of RPKI relying party software

KW Hove - 2022 - essay.utwente.nl
We have looked into the unique characteristics of the RPKI, where unlike other common
protocols all information must be retrieved first, and used that to create a threat model where …

Threat analysis of RPKI relying party software

KW Hove - 2022 - essay.utwente.nl
We have looked into the unique characteristics of the RPKI, where unlike other common
protocols all information must be retrieved first, and used that to create a threat model where …