Detecting Man-in-the-Middle Attacks by Precise Timing

@article{Aziz2009DetectingMA,
  title={Detecting Man-in-the-Middle Attacks by Precise Timing},
  author={B. Aziz and G. Hamilton},
  journal={2009 Third International Conference on Emerging Security Information, Systems and Technologies},
  year={2009},
  pages={81-86}
}
  • B. Aziz, G. Hamilton
  • Published 2009
  • Computer Science
  • 2009 Third International Conference on Emerging Security Information, Systems and Technologies
  • Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a… CONTINUE READING
    28 Citations
    Lightweight Method for Detecting Fake Authentication Attack on Wi-Fi
    • 1
    Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
    • 169
    • PDF
    Practical authentication in large-scale internet applications
    • 1
    Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs
    • 1
    Verifying a delegation protocol for grid systems
    • 4
    • PDF

    References

    SHOWING 1-10 OF 30 REFERENCES
    A man-in-the-middle attack on UMTS
    • 218
    • PDF
    "Man in the Middle" Attacks on Bluetooth
    • D. Kügler
    • Computer Science
    • Financial Cryptography
    • 2003
    • 62
    Defense against man-in-the-middle attack in client-server systems
    • 22
    Discovering Man-in-the-Middle Attacks in Authentication Protocols
    • 30
    A Cost-Based Framework for Analysis of Denial of Service Networks
    • 146
    • PDF
    Attacks on time-of-flight distance bounding channels
    • 95
    • PDF
    Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks
    • 100
    • PDF
    Man-in-the-Middle in Tunnelled Authentication Protocols
    • 148
    • PDF
    An RFID Distance Bounding Protocol
    • G. Hancke, M. Kuhn
    • Computer Science
    • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
    • 2005
    • 523
    • PDF
    Distance-Bounding Protocols (Extended Abstract)
    • 519
    • PDF