Man-in-the-Middle Attack to the HTTPS Protocol
@article{Callegati2009ManintheMiddleAT, title={Man-in-the-Middle Attack to the HTTPS Protocol}, author={F. Callegati and W. Cerroni and M. Ramilli}, journal={IEEE Security & Privacy Magazine}, year={2009}, volume={7}, pages={78-81} }
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data such as career and identity information. Users trust this protocol to prevent unauthorized viewing of their personal, financial, and confidential information over the Web.
Figures and Topics from this paper
Figures
243 Citations
Splitting the HTTPS Stream to Attack Secure Web Connections
- Computer Science
- IEEE Security & Privacy
- 2010
- 20
Analysis and Research on HTTPS Hijacking Attacks
- Computer Science
- 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
- 2010
- 27
PROTECTION AGAINST MAN-IN-THE-MIDDLE ATTACK IN BANKING TRANSACTION USING STEGANOGRAPHY Albina.N,
- 2012
- 1
HTTPAS: active authentication against HTTPS man-in-the-middle attacks
- Computer Science
- IET Commun.
- 2016
- 1
Achieving Communication Effectiveness of Web Authentication Protocol with Key Update
- Computer Science
- MSN
- 2017
Content-based control of HTTPs mail for implementation of IT-convergence security environment
- Computer Science
- J. Intell. Manuf.
- 2014
References
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
- Computer Science
- WWW '05
- 2005
- 94
- PDF