2009 Third International Conference on Emerging Security Information, Systems and Technologies 2009
DOI: 10.1109/securware.2009.20
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(24 citation statements)
references
References 17 publications
0
24
0
Order By: Relevance
“…We will show in this section how A can achieve this. Then A does not have to decrypt and reencrypt traffic between the two connections and may instead step out of the way, allowing C and S to talk directly to one another, making A's intervention difficult to detect even with sophisticated timing measurements [9].…”
Section: A Man-in-the-middle Tls Proxy Servermentioning
confidence: 99%
“…We will show in this section how A can achieve this. Then A does not have to decrypt and reencrypt traffic between the two connections and may instead step out of the way, allowing C and S to talk directly to one another, making A's intervention difficult to detect even with sophisticated timing measurements [9].…”
Section: A Man-in-the-middle Tls Proxy Servermentioning
confidence: 99%
“…The model of MQTT that we introduce here is based on a process algebra called TPi, originally inspired by [26] and further developed in [27], which is a synchronous message-passing calculus capabale of expressing timed inputs.…”
Section: Tpi: a Timed Process Algebramentioning
confidence: 99%
“…In [27], we defined a non-standard name-substitution semantics for TPi, which when abstracted using an approximation function, was capable of yielding an abstract environment φ : N → ℘(N ) ∈ D ⊥ , where N represents the set of abstract names. Unlike N , N is finite and as a result, ℘(N ) is also finite.…”
Section: Syntax and Structural Operational Semantics Of Tpimentioning
confidence: 99%
See 1 more Smart Citation
“…A MiM attacks are one of the most popular and challenging threats in communication systems (such as GSM, GPRS and especially UMTS) and there is a large body of research dedicated to the detection and analysis of different forms of these attacks [13,14,15,16,17]. A MiM attack is defined as an attack in which the intruder is able to read and write messages communicated between two parties of network without either party being conscious of this fact.…”
Section: Man-in-the-middle Attackmentioning
confidence: 99%