Man-in-the-middle attack

Results: 286



#Item
141Cryptographic protocols / Secure communication / System software / Microsoft CryptoAPI / Man-in-the-middle attack / Hooking / Dynamic-link library / HTTP Secure / Computing / Software / Cryptographic software

New reverse engineering technique using API hooking and sysenter hooking, and capturing of cash card access NetAgent Co., Ltd. http://www.netagent.co.jp Kenji Aiko 

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:32
142Embedded Linux / Secure communication / Android / Internet protocols / Man-in-the-middle attack / Transport Layer Security / Mobile operating system / Google / Mobile business intelligence / Computing / Smartphones / Software

Android apps are full of potential leaks, finds study

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-03 09:57:03
143Cryptographic protocols / Internet protocols / Internet standards / DigiNotar / Fox-IT / Certificate authority / Man-in-the-middle attack / Online Certificate Status Protocol / Revocation list / Cryptography / Public-key cryptography / Key management

Black Tulip Report of the investigation into the DigiNotar Certificate Authority breach Classification PUBLIC Customer Ministry of the Interior and Kingdom Relations

Add to Reading List

Source URL: www.rijksoverheid.nl

Language: English - Date: 2012-10-30 10:10:33
144Man-in-the-middle attack / Secure communication / Internet standards / Cryptographic protocols / Cryptography / Convergence / Verisign

A Qualitative Comparison of SSL Validation Alternatives OWASP AppSec Research 2013 August 22nd, 2013 Henning Perl, Sascha Fahl, Michael Brenner, and Matthew Smith Leibniz Universität Hannover

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-29 17:20:56
145Internet protocols / Network architecture / Tor / Man-in-the-middle attack / Secure Shell / Anonymizer / File Transfer Protocol / Relay / Proxy server / Internet / Computing / Internet privacy

Spoiled Onions: Exposing Malicious Tor Exit Relays∗ Philipp Winter1 , Richard Köwer3 , Martin Mulazzani2 , Markus Huber2 , Sebastian Schrittwieser2 , Stefan Lindskog1 , and Edgar Weippl2 1

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-17 19:16:31
146Cipher / Man-in-the-middle attack / Transport Layer Security / Cryptography / Ciphertext / Public-key cryptography

Appeal: [removed]Doc: 66 Filed: [removed]

Add to Reading List

Source URL: pdfserver.amlaw.com

Language: English - Date: 2014-04-16 08:23:25
147ID-based encryption / ID-based cryptography / Key distribution / Public key infrastructure / Digital signature / Man-in-the-middle attack / Key / Cryptography / Key management / Public-key cryptography

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
148Software development / Computing / Internet protocols / HTTP / HTTP Secure / DevOps / RC4 / Cipher suite / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

Recipes for enabling HTTPS The DevOps Approach to Setting up Robust HTTPS Web Apps [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 17:08:46
149IOS / Man-in-the-middle attack / Computer architecture / Computing / Smartphones / Electromagnetism / Compass

Bypass iOS Security Controls Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona

Add to Reading List

Source URL: www.isss.ch

Language: English - Date: 2012-03-30 11:00:26
150Computer security / Hacking / Software testing / Password / Misuse case / Proprietary software / HTTP cookie / Man-in-the-middle attack / Vulnerability / Software / Computing / Computer network security

Software Design Misuse and Abuse Cases Getting Past the Positive Paco Hope Gary McGraw, Ph.D.

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
UPDATE