Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on precise timing.
|Title of host publication
|2009 Third International Conference on Emerging Security Information, Systems and Technologies
|Place of Publication
|Institute of Electrical and Electronics Engineers Inc.
|Number of pages
|Published - Aug 2009
|The Third International Conference on Emerging Security Information - Athens, Greece
Duration: 1 Jun 2009 → …
|The Third International Conference on Emerging Security Information
|1/06/09 → …