Detecting man-in-the-middle attacks by precise timing

Benjamin Aziz, G. Hamilton

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

2206 Downloads (Pure)

Abstract

Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on precise timing.
Original languageEnglish
Title of host publication2009 Third International Conference on Emerging Security Information, Systems and Technologies
Place of PublicationPiwscataway
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages81-86
Number of pages6
ISBN (Print)9780769536682
Publication statusPublished - Aug 2009
EventThe Third International Conference on Emerging Security Information - Athens, Greece
Duration: 1 Jun 2009 → …

Conference

ConferenceThe Third International Conference on Emerging Security Information
Country/TerritoryGreece
Period1/06/09 → …

Fingerprint

Dive into the research topics of 'Detecting man-in-the-middle attacks by precise timing'. Together they form a unique fingerprint.

Cite this