Man-in-the-Middle Attack to the HTTPS Protocol

  title={Man-in-the-Middle Attack to the HTTPS Protocol},
  author={F. Callegati and W. Cerroni and M. Ramilli},
  journal={IEEE Security & Privacy Magazine},
  • F. Callegati, W. Cerroni, M. Ramilli
  • Published 2009
  • Computer Science
  • IEEE Security & Privacy Magazine
  • Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data such as career and identity information. Users trust this protocol to prevent unauthorized viewing of their personal, financial, and confidential information over the Web. 
    243 Citations
    Splitting the HTTPS Stream to Attack Secure Web Connections
    • 20
    Analysis and Research on HTTPS Hijacking Attacks
    • K. Cheng, M. Gao, R. Guo
    • Computer Science
    • 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
    • 2010
    • 27
    HTTPAS: active authentication against HTTPS man-in-the-middle attacks
    • 1
    HTTPS: a Phishing Attack in a Network
    • 2
    • Highly Influenced
    SSL Enhancement
    • PDF