메뉴 건너뛰기




Volumn , Issue , 2009, Pages 81-86

Detecting man-in-the-middle attacks by precise timing

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTING TECHNOLOGY; DISTRIBUTED SYSTEMS; IP SPOOFING; MAN IN THE MIDDLE ATTACKS; MOBILE PROCESS; SAFETY CRITICAL APPLICATIONS; STATIC-ANALYSIS ALGORITHM; WIRELESS COMMUNICATIONS;

EID: 70449472280     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2009.20     Document Type: Conference Paper
Times cited : (35)

References (24)
  • 1
    • 33645672701 scopus 로고    scopus 로고
    • Man-in-the-Middle in Tunnelled Authentication Protocols
    • Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, of, Springer
    • N. Asokan, Valtteri Niemi, and Kaisa Nyberg. Man-in-the-Middle in Tunnelled Authentication Protocols. In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, pages 28-41. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.3364 , pp. 28-41
    • Asokan, N.1    Niemi, V.2    Nyberg, K.3
  • 3
    • 70449499601 scopus 로고    scopus 로고
    • nd Workshop on the Specification, Analysis and Validation for Emerging Technologies, number 94 in Datalogiske Skrifter, Copenhagen, Denmark, July 2002. Roskilde University.
    • nd Workshop on the Specification, Analysis and Validation for Emerging Technologies, number 94 in Datalogiske Skrifter, Copenhagen, Denmark, July 2002. Roskilde University.
  • 4
    • 20144371358 scopus 로고    scopus 로고
    • A static analysis of cryptographic processes: The denotational approach
    • August
    • Benjamin Aziz, Geoff Hamilton, and David Gray. A static analysis of cryptographic processes: The denotational approach. Journal of Logic and Algebraic Programming, 64(2):285-320, August 2005.
    • (2005) Journal of Logic and Algebraic Programming , vol.64 , Issue.2 , pp. 285-320
    • Aziz, B.1    Hamilton, G.2    Gray, D.3
  • 5
    • 18244395833 scopus 로고    scopus 로고
    • The two-phase commitment protocol in an extended pi-calculus. Electronic Notes in Theoretical Comp
    • Martin Berger and Kohei Honda. The two-phase commitment protocol in an extended pi-calculus. Electronic Notes in Theoretical Comp. Science, 39(1), 2000.
    • (2000) Science , vol.39 , Issue.1
    • Berger, M.1    Honda, K.2
  • 6
    • 84976295016 scopus 로고    scopus 로고
    • Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Proceedings of EURO-CRYPT' 93, Workshop on the Theory and Application of of Cryptographic Techniques, 765 of Lecture Notes in Computer Science, pages 344-359, Lofthus, Norway, May 1993. Springer.
    • Stefan Brands and David Chaum. Distance-bounding protocols. In Tor Helleseth, editor, Proceedings of EURO-CRYPT' 93, Workshop on the Theory and Application of of Cryptographic Techniques, volume 765 of Lecture Notes in Computer Science, pages 344-359, Lofthus, Norway, May 1993. Springer.
  • 7
    • 70449505404 scopus 로고    scopus 로고
    • th Annual Symposium on Logic in Computer Science, pages 246-265, Boston, MA, U.S.A., June 2001. IEEE Computer Society Press.
    • th Annual Symposium on Logic in Computer Science, pages 246-265, Boston, MA, U.S.A., June 2001. IEEE Computer Society Press.
  • 8
    • 84876367662 scopus 로고    scopus 로고
    • So near and yet so far: Distance-bounding attacks in wireless networks
    • Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors, ESAS, of, Springer
    • Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors, ESAS, volume 4357 of Lecture Notes in Computer Science, pages 83-97. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4357 , pp. 83-97
    • Clulow, J.1    Hancke, G.P.2    Kuhn, M.G.3    Moore, T.4
  • 14
    • 31344471100 scopus 로고    scopus 로고
    • Dennis Ku7die;gler. Man in the Middle Attacks on Bluetooth. In Rebecca N. Wright, editor, Financial Cryptography, 2742 of Lecture Notes in Computer Science, pages 149-161. Springer, 2003.
    • Dennis Ku7die;gler. "Man in the Middle" Attacks on Bluetooth. In Rebecca N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 149-161. Springer, 2003.
  • 15
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • Catherine Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143-164, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 16
    • 84882715141 scopus 로고    scopus 로고
    • Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. Advances in Information Security: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 30, 2006.
    • Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, and Paul Syverson. Distance bounding protocols: Authentication logic analysis and collusion attacks. Advances in Information Security: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 30, 2006.
  • 18
    • 44049113210 scopus 로고
    • A calculus of mobile processes (parts I & II)
    • September
    • Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes (parts I & II). Information and Computation, 100(1):1-77, September 1992.
    • (1992) Information and Computation , vol.100 , Issue.1 , pp. 1-77
    • Milner, R.1    Parrow, J.2    Walker, D.3
  • 19
    • 58049176948 scopus 로고    scopus 로고
    • Yet another secure distance-bounding protocol. Cryptology ePrint Archive
    • Report 2008/319
    • Ventzislav Nikov and Marc Vauclair. Yet another secure distance-bounding protocol. Cryptology ePrint Archive, Report 2008/319, 2008. http://eprint.iacr. org/.
    • (2008)
    • Nikov, V.1    Vauclair, M.2
  • 20
    • 0034875439 scopus 로고    scopus 로고
    • Defense against man-in-the-middle attack in client-server systems
    • IEEE Computer Society
    • Dimitrios N. Serpanos and Richard J. Lipton. Defense against man-in-the-middle attack in client-server systems. In ISCC, pages 9-14. IEEE Computer Society, 2001.
    • (2001) ISCC , pp. 9-14
    • Serpanos, D.N.1    Lipton, R.J.2
  • 21
    • 38349047971 scopus 로고    scopus 로고
    • Secure verification of location claims with simultaneous distance modification
    • editor, Springer
    • Vitaly Shmatikov and Ming-Hsiu Wang. Secure verification of location claims with simultaneous distance modification. In Iliano Cervesato, editor, ASIAN, volume 4846 of Lecture Notes in Computer Science, pages 181-195. Springer, 2007.
    • (2007) ASIAN, volume 4846 of Lecture Notes in Computer Science , pp. 181-195
    • Shmatikov, V.1    Wang, M.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.