A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arxiv preprint arxiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS

K Bhargavan, AD Lavaud, C Fournet… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
TLS was designed as a transparent channel abstraction to allow developers with no
cryptographic expertise to protect their application against attackers that may control some …

Phishing counter measures and their effectiveness–literature review

S Purkait - Information Management & Computer Security, 2012 - emerald.com
Phishing is essentially a social engineering crime on the Web, whose rampant occurrences
and technique advancements are posing big challenges for researchers in both academia …

Strengthening user authentication through opportunistic cryptographic identity assertions

A Czeskis, M Dietz, T Kohno, D Wallach… - Proceedings of the 2012 …, 2012 - dl.acm.org
User authentication systems are at an impasse. The most ubiquitous method--the password--
has numerous problems, including susceptibility to unintentional exposure via phishing and …

DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis

ZM Fadlullah, T Taleb, AV Vasilakos… - IEEE/ACM …, 2010 - ieeexplore.ieee.org
The unbridled growth of the Internet and the network-based applications has contributed to
enormous security leaks. Even the cryptographic protocols, which are used to provide …

TLS proxies: Friend or foe?

M O'Neill, S Ruoti, K Seamons, D Zappala - Proceedings of the 2016 …, 2016 - dl.acm.org
We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a
Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 …

{Origin-Bound} Certificates: A Fresh Approach to Strong Client Authentication for the Web

M Dietz, A Czeskis, D Balfanz, DS Wallach - 21st USENIX Security …, 2012 - usenix.org
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Page 1
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael …

[HTML][HTML] On the security of SSL/TLS-enabled applications

ML Das, N Samdaria - Applied Computing and informatics, 2014 - Elsevier
Abstract SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications
aim to provide public key certificate based authentication, secure session key establishment …