DocumentCode :
2924499
Title :
DoubleCheck: Multi-path verification against man-in-the-middle attacks
Author :
Alicherry, Mansoor ; Keromytis, Angelos D.
Author_Institution :
Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
fYear :
2009
fDate :
5-8 July 2009
Firstpage :
557
Lastpage :
563
Abstract :
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those services knows the certificates or host keys a priori. A simple solution used in practice is to trust the certificate or the host key when the client connects to a server for the first time. This approach is susceptible to man in the middle attacks, a fact exploited by adversaries in a variety of attacks against unsuspecting users. We develop a simple and scalable solution named DoubleCheck to protect against such attacks. Our solution is achieved by retrieving the certificate from a remote host using multiple alternate paths. Our scheme does not require any new infrastructure; we make use of the Tor anonymity system to reach the destination using multiple independent paths. Hence our solution is easy to deploy in practice. Our solution does not introduce any privacy concerns. We have implemented DoubleCheck as SSH and Firefox extensions, demonstrating its practicality. Our experimental evaluation shows that the impact of DoubleCheck on performance is minimal, since the Tor network is used only for retrieving the certificate for the first time, while the data transfer and subsequent connection establishment follow normal routing rules. Our scheme is an effective way of mitigating the impact of man in the middle attacks without requiring new infrastructure and at low overhead.
Keywords :
data privacy; program verification; public key cryptography; Tor anonymity system; host key; multipath verification; public key infrastructure; security; Cities and towns; Computer science; Information retrieval; Joining processes; Network servers; Privacy; Protection; Protocols; Public key; Routing; Certificates; Man-in-the-middle attack; Tor; Trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2009. ISCC 2009. IEEE Symposium on
Conference_Location :
Sousse
ISSN :
1530-1346
Print_ISBN :
978-1-4244-4672-8
Electronic_ISBN :
1530-1346
Type :
conf
DOI :
10.1109/ISCC.2009.5202224
Filename :
5202224
Link To Document :
بازگشت