Skip to content

Detecting man-in-the-middle attacks by precise timing

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on precise timing.
Original languageEnglish
Title of host publication2009 Third International Conference on Emerging Security Information, Systems and Technologies
Place of PublicationPiwscataway
PublisherIEEE
Pages81-86
Number of pages6
ISBN (Print)9780769536682
Publication statusPublished - Aug 2009
EventThe Third International Conference on Emerging Security Information - Athens, Greece
Duration: 1 Jun 2009 → …

Conference

ConferenceThe Third International Conference on Emerging Security Information
CountryGreece
Period1/06/09 → …

Related information

Relations Get citation (various referencing formats)

ID: 107555