Abstract
Language | English |
---|---|
Pages | 29-39 |
Journal | nternational Journal of Ambient Computing and Intelligence |
Volume | 4 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2 Jan 2012 |
Fingerprint
Cite this
}
Man in the Browser Attacks. / Dougan, T; Curran, K.
In: nternational Journal of Ambient Computing and Intelligence, Vol. 4, No. 1, 02.01.2012, p. 29-39.Research output: Contribution to journal › Article
TY - JOUR
T1 - Man in the Browser Attacks
AU - Dougan, T
AU - Curran, K
PY - 2012/1/2
Y1 - 2012/1/2
N2 - Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ability and success during that time. These attacks are a specialised version of Man-in-the-Middle attack, and operate by stealing authentication data and altering legitimate user transactions to benefit the attackers. This paper examines what Man-in-the-Browser attacks are capable of and how specific versions of the attack are executed, with reference to their control structure, data interaction techniques, and methods for circumventing security. Finally the authors discuss the effectiveness of counter-Man-in-the-Middle strategies, and speculate upon what these attacks tell us about the Internet environment.
AB - Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ability and success during that time. These attacks are a specialised version of Man-in-the-Middle attack, and operate by stealing authentication data and altering legitimate user transactions to benefit the attackers. This paper examines what Man-in-the-Browser attacks are capable of and how specific versions of the attack are executed, with reference to their control structure, data interaction techniques, and methods for circumventing security. Finally the authors discuss the effectiveness of counter-Man-in-the-Middle strategies, and speculate upon what these attacks tell us about the Internet environment.
U2 - 10.4018/jaci.2012010103
DO - 10.4018/jaci.2012010103
M3 - Article
VL - 4
SP - 29
EP - 39
JO - International Journal of Ambient Computing and Intelligence
T2 - International Journal of Ambient Computing and Intelligence
JF - International Journal of Ambient Computing and Intelligence
SN - 1941-6237
IS - 1
ER -