Results 141 to 150 of about 640,321 (187)
Some of the next articles are maybe not open access.
A Survey of Man In The Middle Attacks
IEEE Communications Surveys & Tutorials, 2016The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself.
CONTI, MAURO +2 more
openaire +3 more sources
Revisiting man-in-the-middle attacks against HTTPS
Network Security, 2022A man-in-the-middle (MitM) attack enables threat actors to position themselves in a conversation between two parties. It can be used to eavesdrop on, or impersonate, either of the parties and may enable the perpetrator to steal personal information, including login credentials, payment card data and account details.
Vyron Kampourakis +3 more
openaire +1 more source
Characterizing Wi-Fi Man-In-the-Middle Attacks
2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science, 2020Wi-Fi networks are widely deployed and used privately or professionally. However, many tools exist to implement Man-in-The-Middle attacks, on these networks, to intercept data. If certain Wi-Fi networks are protected, we all by negligence or compellingly use unprotected or poorly protected Wi-Fi networks, making it possible for attackers to collect ...
Andy Amoordon +2 more
openaire +1 more source
Man in the Middle Attack Mitigation in LoRaWAN
2020 International Conference on Inventive Computation Technologies (ICICT), 2020LoRaWAN is a protocol for wireless communication related to the Internet of Things (IoT), that belongs to the Low Power Wide Area Network (LPWAN) protocol family. LoRa technology is used for communication to long distances at a low cost of power consumption.
John Thomas +3 more
openaire +1 more source
A man-in-the-middle attack on UMTS
Proceedings of the 3rd ACM workshop on Wireless security, 2004In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used.
Ulrike Meyer, Susanne Wetzel
openaire +1 more source
Man-in-the-Middle Attack Prevention
2021Man-in-the-Middle is the one thing that breaks the security paradigm for encrypted data in transit. It can raise significant doubts in the minds of customers about a company’s ability to secure customer data in transit. This chapter discusses Man-in-the-Middle At-tack Prevention through the protection schemes of client and server certificate pinning ...
openaire +1 more source
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn’t
2017The security community seems to be thoroughly familiar with man-in-the-middle attacks. However, the common perception of this type of attack is outdated. It originates from when network connections were fixed, not mobile, before 24/7 connectivity became ubiquitous.
Jonker, Hugo +2 more
openaire +2 more sources
Man-in-the-middle attack in HTTP/2
2017 International Conference on Intelligent Computing and Control (I2C2), 2017Hyper Text Transfer Protocol Version 2 (HTTP/2) is the upgrade to the popularly used HTTP/1.1. This protocol has been created to enhance the already existing services and applications based on the older protocol with few modifications and rewriting. Thus, this has opened up to new possible vulnerabilities and attacks on them. HTTP/2 relies on Transport
Parth Patni +4 more
openaire +1 more source
Man-in-the-Middle Attack to the HTTPS Protocol
IEEE Security & Privacy Magazine, 2009Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data such as career and identity information. Users trust this protocol to prevent unauthorized viewing of their personal, financial, and confidential information ...
CALLEGATI, FRANCO +2 more
openaire +1 more source

