Detecting Man-in-the-Middle Attacks by Precise Timing

@article{Aziz2009DetectingMA,
  title={Detecting Man-in-the-Middle Attacks by Precise Timing},
  author={Benjamin Aziz and Geoff W. Hamilton},
  journal={2009 Third International Conference on Emerging Security Information, Systems and Technologies},
  year={2009},
  pages={81-86}
}
  • B. Aziz, G. Hamilton
  • Published 18 June 2009
  • Computer Science
  • 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a… Expand
Detecting Man-in-the-Middle Attacks Against Transport Layer Security Connections with Timing Analysis
Abstract : The Transport Layer Security (TLS) protocol is a vital component to the protection of data as it traverses across networks. From e-commerce websites to Virtual Private Networks (VPNs), TLSExpand
Improved SSL/TLS Man-in-the-middle attack detection technique using timing analysis and other behavioral anomalies
TLDR
This research was conducted to confirm the possibility of mitigating the continuous threat that attacks such as the man-in-the-middle constitute to the SSL and TLS key exchange by analyzing differences in time and other possible behavioral anomalies between a simulated attack and a standard SSL session through the use of machine learning. Expand
Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
TLDR
A number of requirements for trustworthy security-related data collection are proposed, and detection mechanisms in MANETs that were published in recent 20 years are reviewed and a number of open issues are identified. Expand
Lightweight Method for Detecting Fake Authentication Attack on Wi-Fi
TLDR
It can be concluded that the proposed method using comparison of BSSID / MAC address is an effective way to detect fake authentication attacks on Wi-Fi networks. Expand
Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey
TLDR
A detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on are presented. Expand
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
TLDR
Security of internet access over the Third Generation (3G) telecommunication systems is considered and Universal Mobile Telecommunications System (UMTS) is selected as the most popular system among 3G systems and authentication factor is more interesting than other factors for hackers. Expand
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
TLDR
This work designs and implements two new TLS extensions that strengthen the authentication guarantees of the handshake and develops an exemplary HTTPS client library that implements several mitigations, on top of a previously verified TLS implementation, and proves that their composition provides strong, simple application security. Expand
Practical authentication in large-scale internet applications
TLDR
This dissertation provides robust and practical authentication mechanisms that can improve the overall security of large-scale VoIP and Web applications and shows that there is no inherent conflict between stronger authentication and other system goals. Expand
Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs
TLDR
The results show that it is possible to select a large set of CRPs that can be exposed to an attacker resulting in a modeling accuracy as low as 74%, while without the selection process the accuracy increases to 93%. Expand
Verifying a delegation protocol for grid systems
TLDR
A non-uniform static analysis for formally verifying a protocol used in large-scale Grid systems for achieving delegations from users to critical system services reveals the vulnerability of non-deterministic delegation chains. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 30 REFERENCES
A man-in-the-middle attack on UMTS
TLDR
A man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies, is presented, showing that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection. Expand
"Man in the Middle" Attacks on Bluetooth
  • D. Kügler
  • Computer Science
  • Financial Cryptography
  • 2003
TLDR
While the built-in point-to-point encryption could have offered some protection against man in the middle attacks, a flaw in the specification nullifies this countermeasure. Expand
Defense against man-in-the-middle attack in client-server systems
  • D. Serpanos, R. Lipton
  • Computer Science
  • Proceedings. Sixth IEEE Symposium on Computers and Communications
  • 2001
TLDR
A methodology based on simple hardware devices, called "spies", is introduced, which enables servers to establish client integrity, and leads to a successful defense against viruses that use man-in-the-middle attacks. Expand
Discovering Man-in-the-Middle Attacks in Authentication Protocols
TLDR
This work proposes a simplified generic approach based on a challenge-response criterion to discover man-in-the-middle attacks in authentication protocols and demonstrates how the inability in finding out the true originator of a message guides us through a sequence of logical arguments eventually leading to a successful man- in the middle attack. Expand
A Cost-Based Framework for Analysis of Denial of Service Networks
TLDR
This paper shows how some principles that have already been used to make cryptographic protocols more resistant to denial of service can be formalized based on a modification of the Gong-Syverson fail-stop model of cryptographic protocols, and indicates the ways in which existing cryptographic protocol analysis tools could be modified to operate within this formal framework. Expand
Attacks on time-of-flight distance bounding channels
TLDR
It is concluded that conventional RF channels can be problematic for secure distance- bounding implementations and the merits and weaknesses of special distance-bounding channels that have been proposed for RFID applications are discussed. Expand
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks
TLDR
The first full-scale formal analysis of a distance bounding protocol is given, and it is shown how this analysis helps to reduce message and cryptographic complexity without reducing security. Expand
Man-in-the-Middle in Tunnelled Authentication Protocols
TLDR
This paper proposes a solution to the problem of a man-in-the-middle attack on protocol composition by using a cryptographic binding between the client authentication protocol and the tunnel protocol. Expand
An RFID Distance Bounding Protocol
  • G. Hancke, M. Kuhn
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
TLDR
A new distance-bounding protocol based on ultra-wideband pulse communication is proposed, aimed at being implementable using only simple, asynchronous, low-power hardware in the token, particularly well suited for use in passive low-cost tokens, noisy environments and high-speed applications. Expand
Distance-Bounding Protocols (Extended Abstract)
TLDR
The "distance bounding" technique is introduced, which solves the problem of timing the delay between sending out a challenge bit and receiving back the corresponding response bit and can be integrated into common identification protocols. Expand
...
1
2
3
...