Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Hproxy: client-side detection of ssl stripping attacks

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • Contributors:
      The Pennsylvania State University CiteSeerX Archives
    • الموضوع:
      2010
    • Collection:
      CiteSeerX
    • نبذة مختصرة :
      In today’s world wide web hundreds of thousands of companies use SSL to protect their customers ’ transactions from potential eavesdroppers. Recently, a new attack against the common usage of SSL surfaced, SSL stripping. The attack is based on the fact that users almost never request secure pages explicitly but rather rely on the servers, to redirect them to the appropriate secure version of a particular website. An attacker, after becoming man-in-the-middle can suppress such messages and provide the user with “stripped ” versions of the requested website forcing him to communicate over an insecure channel. In this paper, we analyze the ways that SSL stripping can be used by attackers and present a countermeasure against such attacks. We leverage the browser’s history to create a security profile for each visited website. Each profile contains information about the exact use of SSL at each website and all future connections to that site are validated against it. We show that SSL stripping attacks can be prevented with acceptable overhead and without support from web servers or trusted third parties.
    • File Description:
      application/pdf
    • Relation:
      http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.319; http://fort-knox.org/files/hproxy.pdf
    • الدخول الالكتروني :
      http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.319
      http://fort-knox.org/files/hproxy.pdf
    • Rights:
      Metadata may be used without restrictions as long as the oai identifier remains attached to it.
    • الرقم المعرف:
      edsbas.3129B243