Detecting Unauthorized Modification of HTTP Communication with Steganograhpy
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F49777513%3A23520%2F10%3A00503973" target="_blank" >RIV/49777513:23520/10:00503973 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Detecting Unauthorized Modification of HTTP Communication with Steganograhpy
Original language description
HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access bankingservices on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances, it is possible to attack HTTPS secured communication successfully. This paper proposes a steganography scheme that can be used to detect unauthorized modifications of HTTP communication.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
BD - Information theory
OECD FORD branch
—
Result continuities
Project
—
Continuities
S - Specificky vyzkum na vysokych skolach<br>I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2010
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
ICIW 2010
ISBN
978-0-7695-4022-1
ISSN
—
e-ISSN
—
Number of pages
6
Pages from-to
26-31
Publisher name
CPS
Place of publication
Barcelona
Event location
Barcelona
Event date
May 9, 2010
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—