Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures