

Ayyagari, K.S.A.: Man in the browser attacks (2017) Google Scholar In 27th USENIX security symposium (USENIX Security 18) (pp. Bui, T., Rao, S.P., Antikainen, M., Bojan, V.M., Aura, T.: Man-in-the-machine: exploiting ill-secured communication inside the computer. In international conference on Ad-Hoc networks and wireless (pp. Navas, R.E., Le Bouder, H., Cuppens, N., Cuppens, F., Papadopoulos, G.Z.: Do not trust your neighbors! A small IoT platform illustrating a man-in-the-middle attack. In IEEE Symposium on Security and Privacy (SP) (2019) Google Scholar Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Breaking LTE on layer two. Sun DZ Mu Y Susilo W Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5. Callegati F Cerroni W Ramilli M Man-in-the-middle attack to the HTTPS protocol IEEE Secur. Dougan T Curran K Man in the browser attacks Int. Mallik A Ahsan A Shahadat M Tsou J Man-in-the-middle-attack: understanding in simple words Int. Conti M Dragoni N Lesyk V A survey of man in the middle attacks IEEE Commun. Among its features, the absence of the need to install malware of any kind on the victim’s machine and the total control it allows the attacker are to be emphasized. It will be seen how BitM expands the range of the possible attacker’s actions, at the same time making them easier to implement. It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings.

However, most of its many variants involve difficulties that make it not always possible.

Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field.
