2016
DOI: 10.5815/ijcnis.2016.02.02
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of SSL/TLS Attacks

Abstract: Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The-Middle (MITM) attacks. Exploiting th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…This approach is called control-based attack, in which an intruder misuses a memory flaw, such as a buffer overflow or use-after-free, to overwrite control-data such as a return address or function pointer and thereby modifies the control-flow of the program. In order to get the control of an application, which is referred to as hijacking [2], primarily it is necessary to inject specific data which can be run to get the control of system. This method is known, in the cyber world, as control-data attack.…”
Section: Definition Of Problem (Data Modification Attack)mentioning
confidence: 99%
“…This approach is called control-based attack, in which an intruder misuses a memory flaw, such as a buffer overflow or use-after-free, to overwrite control-data such as a return address or function pointer and thereby modifies the control-flow of the program. In order to get the control of an application, which is referred to as hijacking [2], primarily it is necessary to inject specific data which can be run to get the control of system. This method is known, in the cyber world, as control-data attack.…”
Section: Definition Of Problem (Data Modification Attack)mentioning
confidence: 99%