2010
DOI: 10.1016/s1353-4858(10)70046-5
|View full text |Cite
|
Sign up to set email alerts
|

Catching the fraudulent Man-in-the-Middle and Man-in-the-Browser

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Some others do allow first-time transfers to new accounts, but only with an extra authentication step or with a limit on the amount of money (which is sometimes adjustable by the user in the home banking environment). (3) Malware aimed at home banking can be written once and customized for each targeted bank site to allow browser injection and hijacking, a modus operandi known as Man-in-the-Browser [Eisen 2010;Curran and Dougan 2012]. Malware kits are developed as an open platform to be customized by an adversary for a specific target audience [Ollmann 2008;Alazab et al 2012].…”
Section: Security Implicationsmentioning
confidence: 99%
“…Some others do allow first-time transfers to new accounts, but only with an extra authentication step or with a limit on the amount of money (which is sometimes adjustable by the user in the home banking environment). (3) Malware aimed at home banking can be written once and customized for each targeted bank site to allow browser injection and hijacking, a modus operandi known as Man-in-the-Browser [Eisen 2010;Curran and Dougan 2012]. Malware kits are developed as an open platform to be customized by an adversary for a specific target audience [Ollmann 2008;Alazab et al 2012].…”
Section: Security Implicationsmentioning
confidence: 99%
“…Roberto, Davide Ariu, Prahlad, Giacinto and Wenke Lee have presented the multiple classifier system for anomaly detection [14] that has a high detection rate against shell code attacks, polymorphic attacks and generic attacks. Ori Eisen has discussed the method of catching the man-in-the-middle and man-in-the-browser [15]. Yi pin Liao and S. S. Wang have presented the Self Certified public keys (SCPKs) which are more secure than the traditional HTTP digest authentication protocol for Session Initiation Protocol [16].…”
Section: Related Workmentioning
confidence: 99%
“…MITM attacks exploit vulnerabilities at various levels of the OSI (Open System Interconnection) architecture: Man-inthe-browser attacks at application level [27], Secure Socket Layer (SSL) hijack at the transport level [19], IP spoofing at the network layer [33] and ARP Poisoning attacks at the data link layer [1]. Over the years these attacks have been adapted to work with new emerging network technologies such as GSM (Global System for Mobile communications) and UMTS (Universal Mobile Telecommunications System) [16], WiFi [5] and to IoT (Internet-of-Things) systems [18].…”
Section: Introductionmentioning
confidence: 99%