skip to main content
10.1109/SECURWARE.2009.20guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting Man-in-the-Middle Attacks by Precise Timing

Published: 18 June 2009 Publication History

Abstract

Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless passport verification. This paper proposes a static analysis algorithm for the detection of man-in-the-middle attacks in mobile processes using a solution based on precise timing.

Cited By

View all

Index Terms

  1. Detecting Man-in-the-Middle Attacks by Precise Timing
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SECURWARE '09: Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
    June 2009
    327 pages
    ISBN:9780769536682

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 18 June 2009

    Author Tags

    1. Process Algebra
    2. Security
    3. Static Analysis
    4. Timed Algebra

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media