Title :
Detecting Man-in-the-Middle Attacks by Precise Timing
Author :
Aziz, Benjamin ; Hamilton, Geoff
Author_Institution :
e-Sci. Centre, STFC Rutherford Appleton Lab., Didcot, UK
Abstract :
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on precise timing.
Keywords :
mobile computing; security of data; IP spoofing; distributed computing technologies; distributed system; man-in-the-middle attack dtection; mobile processes; remote wireless passport verification; safety-critical application; static analysis algorithm; wireless communication; Algorithm design and analysis; Distributed computing; Information security; Information services; Laboratories; Shape; Timing; Wireless application protocol; Wireless communication; Wireless sensor networks; Process Algebra; Security; Static Analysis; Timed Algebra;
Conference_Titel :
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on
Conference_Location :
Athens, Glyfada
Print_ISBN :
978-0-7695-3668-2
DOI :
10.1109/SECURWARE.2009.20