publication . Preprint . 2013

Timing Analysis of SSL/TLS Man in the Middle Attacks

Benton, Kevin; Bross, Ty;
Open Access English
  • Published: 16 Aug 2013
Man in the middle attacks are a significant threat to modern e-commerce and online communications, even when such transactions are protected by TLS. We intend to show that it is possible to detect man-in-the-middle attacks on SSL and TLS by detecting timing differences between a standard SSL session and an attack we created.
free text keywords: Computer Science - Cryptography and Security
Download from

[1] You can't always trust ssl. // 01/you-cant-always-trust-ssl.aspx, 2009.

[2] Wired: Law enforcement appliance subverts ssl. 2010/03/packet-forensics/, 2010.

[3] Cain and abel. html, 2012.

[7] M. Alicherry and A. D. Keromytis. Doublecheck: Multi-path veri cation against manin-the-middle attacks. In ISCC, pages 557{563. IEEE, 2009. [OpenAIRE]

[8] K. Benton, J. Jo, and Y. Kim. Signaturecheck: a protocol to detect man-in-the-middle attack in ssl. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, pages 60:1{ 60:1, New York, NY, USA, 2011. ACM.

[9] Z. M. Fadlullah, T. Taleb, A. V. Vasilakos, M. Guizani, and N. Kato. Dtrab: combating against attacks on encrypted protocols through tra c-feature analysis. IEEE/ACM Trans. Netw., 18(4):1234{1247, Aug. 2010. [OpenAIRE]

[10] M. Marlinspike. Null pre x attacks against ssl/tls certi cates. Black Hat Vegas 2009, 2009.

[11] C. Soghoian and S. Stamm. Certi ed lies: Detecting and defeating government interception attacks against ssl. Technical report, 2010.

[12] M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. A. Osvik, and B. Weger. Short chosen-pre x collisions for md5

Any information missing or wrong?Report an Issue