A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …
studies have been conducted to highlight those security challenges. However, the majority …
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …
cryptographic expertise to protect their application against attackers that may control some …
Phishing counter measures and their effectiveness–literature review
S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …
and technique advancements are posing big challenges for researchers in both academia …
Strengthening user authentication through opportunistic cryptographic identity assertions
User authentication systems are at an impasse. The most ubiquitous method--the password--
has numerous problems, including susceptibility to unintentional exposure via phishing and …
has numerous problems, including susceptibility to unintentional exposure via phishing and …
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis
The unbridled growth of the Internet and the network-based applications has contributed to
enormous security leaks. Even the cryptographic protocols, which are used to provide …
enormous security leaks. Even the cryptographic protocols, which are used to provide …
TLS proxies: Friend or foe?
We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …
{Origin-Bound} Certificates: A Fresh Approach to Strong Client Authentication for the Web
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Page 1
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael …
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael …
[HTML][HTML] On the security of SSL/TLS-enabled applications
ML Das, N Samdaria - Applied Computing and informatics, 2014 - Elsevier
Abstract SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications
aim to provide public key certificate based authentication, secure session key establishment …
aim to provide public key certificate based authentication, secure session key establishment …