2014 6th International Conference on Cyber Conflict (CyCon 2014) 2014
DOI: 10.1109/cycon.2014.6916404
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and defeating advanced man-in-the-middle attacks against TLS

Abstract: Sobre los derechos de acceso: Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE.TLS es un bloque esencial para la construcción de redes privadas. Un aspecto crítico para la seguridad de TLS es la autenticación y … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…The first time a browser interacts with such a device, the user will be warned that the presented certificate is not publicly signed and must accept this self-signed certificate. This creates an opportunity for a man-in-the-middle (MITM) attack (Conti et al, 2016;De La Hoz et al, 2014). The use of these self-signed certificates also decreases zero-trust metrics (Simpson, 2022).…”
Section: The Intranet Certification Problemmentioning
confidence: 99%
“…The first time a browser interacts with such a device, the user will be warned that the presented certificate is not publicly signed and must accept this self-signed certificate. This creates an opportunity for a man-in-the-middle (MITM) attack (Conti et al, 2016;De La Hoz et al, 2014). The use of these self-signed certificates also decreases zero-trust metrics (Simpson, 2022).…”
Section: The Intranet Certification Problemmentioning
confidence: 99%
“…MITM (Man In The Middle): A classic attack method consists in creating its access point [27], and forging the gateway to access a requesting server. When an attacker secretly relays and, if necessary, modifies the connection between two objects that believe they interact directly with each other, it is a method to compromise a communication channel by connecting to the channel between contractors, followed by an intervention the transmission protocol ( Figure 4).…”
Section: Possibilities Of Attackmentioning
confidence: 99%
“…This key will be used by the website coordinator to encrypt the carrier image's symmetric key before it is emailed to the requestor. The use of a video call interview is intended to defeat any so-called Man-in-the-Middle (MITM) attacks (see de la Hoz et al (2014)) during public key transmission from the requestor to the website coordinator and works by verifying that the apparent requestor is not in reality an attacker masquerading as the legitimate requestor. In order to do this, the website coordinator compares the face of the person on the video call with known photographs of the requestor, and asks a number of questions to verify that the person in the video call is not an attacker impersonating the requestor.…”
Section: Security Protocolsmentioning
confidence: 99%