Title | ||
---|---|---|
The Zurich Trusted Information Channel --- An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks |
Abstract | ||
---|---|---|
This paper introduces the Zurich Trusted Information Channel (ZTIC, for short), a cost-efficient and easy-to-use approach to defend online services from man-in-the-middle and malicious software attacks. A small, cheap to manufacture and zero-installation USB device with a display runs a highly efficient security software stack providing the communications endpoint between server and customer. The insecure user PC is used solely to relay IP packets and display non-critical transaction information. All critical information is parsed out of the mutually-authenticated SSL/TLS connections that the ZTIC establishes to the server and shown on the display for explicit user approval. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-68979-9_6 | TRUST |
Keywords | Field | DocType |
malicious software attacks,insecure user pc,explicit user approval,ip packet,communications endpoint,malicious software attack,critical information,zurich trusted information channel,non-critical transaction information,efficient defence,tls connection,efficient security software,secure token,cost efficiency,authentication,malicious software,man in the middle | Internet privacy,Man-in-the-middle attack,Authentication,Computer security,Computer science,Network packet,Communication channel,Malware,Security token,USB,Secure by design | Conference |
Volume | ISSN | Citations |
4968 | 0302-9743 | 20 |
PageRank | References | Authors |
1.27 | 4 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thomas Weigold | 1 | 91 | 8.76 |
Thorsten Kramp | 2 | 137 | 13.18 |
Reto Hermann | 3 | 66 | 7.55 |
Frank Höring | 4 | 21 | 1.62 |
Peter Buhler | 5 | 55 | 6.84 |
Michael Baentsch | 6 | 133 | 25.31 |