2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA) 2009
DOI: 10.1109/imsaa.2009.5439461
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating man in the middle attack over secure sockets layer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 2 publications
0
16
0
Order By: Relevance
“…Ross et al presented a browser extension tool called PwdHash, which uses the domain name of the remote site as salt for password hashing to protect user's identity and other private information by mitigating MITM for phishing. Joshi et al improved Pwd‐Hash by hashing the user password with the SSL certificate parameters instead of URL parameters. Thus, it detects phishing websites and, if the phishing site is a MITM, then it would hash the password with the SSL certificate.…”
Section: Related Workmentioning
confidence: 99%
“…Ross et al presented a browser extension tool called PwdHash, which uses the domain name of the remote site as salt for password hashing to protect user's identity and other private information by mitigating MITM for phishing. Joshi et al improved Pwd‐Hash by hashing the user password with the SSL certificate parameters instead of URL parameters. Thus, it detects phishing websites and, if the phishing site is a MITM, then it would hash the password with the SSL certificate.…”
Section: Related Workmentioning
confidence: 99%
“…Banking information, such as credit card details, is usually the primary target and the success Phishers tend to have means this type of attack has become the most popular way of conducting cyber-crime [140]. were victims and were affected financially as a result of successful Phishing attacks [141]. Whilst security is steadily improving for combatting attacks such as these, there is a real need for alternative approaches to defence.…”
Section: Cyber-threat Growing Concernmentioning
confidence: 99%
“…Here we consider three attacks which are particularly important when sensitive data is being transmitted. These are the Man-In-The-Middle attack [28], the Isomorphic attack [29] and the Denial of Decryption attack [30]. The Man-In-The-Middle attack is designed to allow an attacker to intercept, read, and possibly change information being sent between two parties.…”
Section: Proof Of Securitymentioning
confidence: 99%