Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp019p290c66r
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorKernighan, Brian-
dc.contributor.authorStedman, Collin-
dc.date.accessioned2015-06-26T18:14:50Z-
dc.date.available2015-06-26T18:14:50Z-
dc.date.created2015-04-30-
dc.date.issued2015-06-26-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp019p290c66r-
dc.description.abstractThis work addresses the viability of man in the middle (MITM) attacks, and stripping attacks in particular, on the web today. First, to present the severity of the threat, a modi ed version on Moxie Marlinspike's sslstrip attack is demonstrated to have the capability to compromise web applications with arbitrary authentication schemes in an automated fashion. Several methods for mitigating the attacks are then discussed in turn. HSTS, the incumbent technology, is found to have numerous de ciencies, the most important of which is its failure to guarantee protection against stripping attacks at all. A new variation on HSTS, called Distributed HSTS, provides the desired security guarantee for all connections involving a valid TLS certi cate. Lastly, another distributed solution called NOSTRIP has the best theoretical properties of the three, ensuring security for all connections between hosts without the need for TLS certi cates. Though these methods may be e ective defenses to stripping attacks, additional MITM vulnerabilities are shown to exist due to the behavior of browsers. Thus, it is concluded that the web is still far from being safe from MITM attacks, and continued research on the topic is called for.en_US
dc.format.extent52 pagesen_US
dc.language.isoen_USen_US
dc.titleOur Man in the Middle: An Investigation of TLS Stripping Attacks and Defenses on the Weben_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2015en_US
pu.departmentComputer Scienceen_US
pu.pdf.coverpageSeniorThesisCoverPage-
Appears in Collections:Computer Science, 1988-2020

Files in This Item:
File SizeFormat 
PUTheses2015-Stedman_Collin.pdf4.44 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.