Persistent MobileApp-in-the-Middle (MAitM) attack

2Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The recent publication of the “Browser in the Middle” attack has demonstrated an effective way to compromise a good number of variants of Multifactor Authentication and to control the information flow between the victim an the accessed service. That attack was mainly aimed at the victim use of a desktop browser to access a service. The present paper shows how that attack may be extended to involve the mobile environment and how, thanks to that enhancement, the attack may also gain the persistence attribute. The new attack is named MobileApp-in-the-Middle (MAitM). Again, as in BitM, no installation of malware on the victim’s platform is needed with MAitM.

Cite

CITATION STYLE

APA

Catalano, C., & Tommasi, F. (2024). Persistent MobileApp-in-the-Middle (MAitM) attack. Journal of Computer Virology and Hacking Techniques, 20(1), 27–39. https://doi.org/10.1007/s11416-023-00484-z

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free