Recent studies have shown that a significant number of mobile applications, often handling sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities. Most of the time, these vulnerabilities are due to improper use of the SSL protocol (in particular, in its handshake phase), resulting in applications exposed to man-in-the-middle attacks. In this paper, we present MITHYS, a system able to: (i) detect applications vulnerable to man-in-the-middle attacks, and (ii) protect them against these attacks. We demonstrate the feasibility of our proposal by means of a prototype implementation in Android, named MITHYSApp. A thorough set of experiments assesses the validity of our solution in detecting and protecting mobile applications from man-in-the-middle attacks, without introducing significant overheads. Finally, MITHYSApp does not require any special permissions nor OS modifications, as it operates at the application level. These features make MITHYSApp immediately deployable on a large user base.
|Title of host publication||Security and Trust Management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings|
|Publication status||Published - 2013|
|Event||9th International Workshop on Security and Trust Management (STM 2013) - Egham, United Kingdom|
Duration: 12 Sep 2013 → 13 Sep 2013
|Workshop||9th International Workshop on Security and Trust Management (STM 2013)|
|Period||12/09/2013 → 13/09/2013|
|Series||Lecture Notes in Computer Science|