Skip to main content

The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks

  • Conference paper
Book cover Trusted Computing - Challenges and Applications (Trust 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4968))

Included in the following conference series:

Abstract

This paper introduces the Zurich Trusted Information Channel (ZTIC, for short), a cost-efficient and easy-to-use approach to defend online services from man-in-the-middle and malicious software attacks. A small, cheap to manufacture and zero-installation USB device with a display runs a highly efficient security software stack providing the communications endpoint between server and customer. The insecure user PC is used solely to relay IP packets and display non-critical transaction information. All critical information is parsed out of the mutually-authenticated SSL/TLS connections that the ZTIC establishes to the server and shown on the display for explicit user approval.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Weigold, T., Kramp, T., Baentsch, M.: Remote Client Authentication. IEEE Security & Privacy journal (accepted, 2008) (to be published)

    Google Scholar 

  2. Federal Office of Police, Swiss Reporting and Analysis Centre for Information Assurance MELANI. Semi-annual report 2007/1, http://www.melani.admin.ch/

  3. RSA SecurityID Token, RSA Security (2007), http://www.rsa.com/node.aspx?id=1156

  4. Schneier, B.: Two-Factor Authentication: Too Little, Too Late. Comm. ACM 48(4), 136 (2005)

    Article  Google Scholar 

  5. Schneier, B.: Fighting Fraudulent Transactions (November 27, 2006), http://www.schneier.com/blog/archives/2006/11/fighting_fraudu.html

  6. Federal Office for Information Security. The IT Security Situation in Germany (2007), http://www.bsi.de/english/publications/securitysituation/Lagebericht_2007_englisch.pdf

  7. The FINREAD (FINancial Transactional IC Card READer) project,http://www.finread.com

    Google Scholar 

  8. Hiltgen, A., Kramp, T., Weigold, T.: Secure Internet Banking Authentication. IEEE Security & Privacy 4(2), 21–29 (2006)

    Article  Google Scholar 

  9. AXSionics AG. The Internet Passport, http://www.axsionics.ch

  10. Giesecke & Devrient GmbH. Internet Smart Card Technologie, http://www.gi-de.com/portal/page?_pageid=36,53930&_dad=portal&_schema=PORTAL

  11. Kobil Systems. mIDentity Mobile Banking, http://www.kobil.de/fileadmin/download/products/ONLNEFLYER-MIDENTITY-MOBILEBANKING_1V00_20060420_DE.PDF

  12. Hines, M.: Malware flood driving new AV: InfoWorld (December 14, 2007), http://www.infoworld.com/article/07/12/14/Malware-flood-driving-new-AV_1.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Peter Lipp Ahmad-Reza Sadeghi Klaus-Michael Koch

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weigold, T., Kramp, T., Hermann, R., Höring, F., Buhler, P., Baentsch, M. (2008). The Zurich Trusted Information Channel – An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. In: Lipp, P., Sadeghi, AR., Koch, KM. (eds) Trusted Computing - Challenges and Applications. Trust 2008. Lecture Notes in Computer Science, vol 4968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68979-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-68979-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68978-2

  • Online ISBN: 978-3-540-68979-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics