Deakin University
Browse

Man-in-the-middle attacks evolved... but our security models didn’t

conference contribution
posted on 2017-01-01, 00:00 authored by H Jonker, S Mauw, R Trujillo-Rasua
The security community seems to be thoroughly familiar with man-in-the-middle attacks. However, the common perception of this type of attack is outdated. It originates from when network connections were fixed, not mobile, before 24/7 connectivity became ubiquitous. The common perception of this attack stems from an era before the vulnerability of the protocol’s context was realised. Thanks to revelations by Snowden and by currently available man-in-the-middle tools focused on protocol meta-data (such as so-called “Stingrays” for cellphones), this view is no longer tenable. Security protocols that only protect the contents of their messages are insufficient. Contemporary security protocols must also take steps to protect their context: who is talking to whom, where is the sender located, etc. In short: the attacker has evolved. It’s high time for our security models and requirements to catch up.

History

Volume

10368

Pagination

19-25

Location

Brno, Czech Republic

Start date

2016-04-07

End date

2016-04-08

ISSN

0302-9743

eISSN

1611-3349

ISBN-13

9783319620329

Language

eng

Publication classification

E Conference publication, E1.1 Full written paper - refereed

Copyright notice

2017, Springer International Publishing AG

Editor/Contributor(s)

Anderson J, Matyas V, Christianson B, Stajano F

Title of proceedings

Security protocols XXIV : Proceedings of the 24th International Workshop

Event

Security protocols. International workshop (24th : 2016 : Brno, Czech Republic)

Publisher

Springer

Place of publication

Cham, Switzerland

Series

Lecture notes in computer science

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC