Submitted By: Prosunjit Biswas (@01232785)

      1. Difference between Covert Channel & Side Channel:

In the simplest definition, ‘A communication channel is covert if it is neither designed nor intended to
transfer information at all’ [1]. A more compelling definition appears as – ‘Given a security model M and
its interpretation I(M) in an operating system and any potential communication between two
subjects I(Sh) and I(Si) of ((M) is covert only if the communication between the subjects Sh and Si of the
model of M is illegal in M’ [2].

                                                                                   On the other hand, “Side channel leaks
      S                            Subjects
                                                                                 implementation-specific characteristics to
                                                                          S
      i
      d
                                                                          i      recover the secret parameters involved in
                                                                          d
      e
                                                                          e      the computation and specific to given
      C
                                                                          C      implementation.”[3] Figure 1. shows the
      h
                                                                          h
      a                                                 …….. :            a
                                                                                 position of covert channel      and side
      n                                                convert
      n                                                channel
                                                                          n      channel in a system.
                                                                          n
      e      Projection Model                                             e
      l
                                                                          l      Fig 1: Side channel & Covert channel.
                  Environment Side Effect (Heat, Sound, Power etc)



i)           Covert channel is created inside a protection model where either that channel was not identified
             or not intended for communication where as side channel stays outside the protection model
             based on the side effect of the model with the environment (ex: electromagnetic emission).
ii)          Covert channel may require cooperating sender and receiver where as side channel do not require
             sender.

Conversion between Covert channel and Side channel: As shown in figure 1b, we can convert side-

                                                      channel into covert channel and vice versa.
      M                                              We see that for model M1, C1 is side channel
      o Information Leaking
      d                                              because it stays outside the model but if we
              C1       Side channel for M1 / Covert channel for M2
      e                                              build another protection model M2 including
      l
             Protection                              M1, then C1 becomes the Covert channel for
      M      Model (M1)
                                                     M2 by leaking information from a subject in M1
  2
                                                     to other subject outside m1. Thus by changing
the protection model from M1 to M2 we can convert between side channel into covert channel. Similarly,
we can do the opposite.

Fig 1b: Conversion between side & Covert Channel

References:

[1] B.W. Lampson, "A Noto on the Confinement Problem," Communications ACM 16 (1973). 613-615.
[2] C. Tsai and V. D. Gligor, "A Bandwidth Computation Model for Covert Storage Channels and its Applications,"
    IEEE Symposium on Security and Privacy, 1988.
[3] F.-X. Standaert. Introduction to side-channel attacks. In I. M. Verbauwhede, Secure Integrated Circuit.2009
          I have not taken any help on this examination from anybody and have not given any help to
                                                  anybody.
2. Intrusion Detection & Intrusion Prevention System:
       Although both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) analyze
       the traffic and work based on different predefined rules, there are fundamental differences on how
       data they work and on action they can take. Figure 2. Shows the scope of both system in some
       great details.




                           Fig 2: Breakdown of Intrusion Detection and Intrusion Prevention System

         Differences:
         i)     IPS works with real traffic which means that the traffic, if allowed, is feed to real devices
                where as IDS works with the copy of the data, in the sense that even if we have IDS
                setup to update firewall with blocking rules, the initial attack packet has already gone
                through.
         ii)     IDS is a passive device only used for loging/reporting purpose where as IPS acts as an
                active device which can terminate network connection or user sessions based on the need
                of IPS system.


Implications of Base-rate fallacy on IPS:

Similar to the base-rate fallacy in IDS, IPS effectiveness depends on how we can improve false alarm
rate. If we use an IPS with high false alarm rate, eventually it will hurt system performance badly by
filtering / stopping legitimate traffic. So, the impact of base rate fallacy on IPS is much more critical than
its impact on IDS.



Reference:

[1] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of
the 6th ACM Conference on Cornpurer and Communications Securiry,1999.
[2] “IDS vs IPS”, available at : http://blog.inetu.net/2011/02/intrusion-detection-or-prevention-ids-vs-ips/
[3] “IDS vs IPS”, available at : http://www.focus.com/fyi/ids-vs-ips/



       I have not taken any help on this examination from anybody and have not given any help to
                                               anybody.
3. Continuous enforcement ensures that the control on a resource stays even after access to that resource
    is given to a user. Thus, it is required to monitor consumption of the resource or subsequent request for
    consumption so that it does not violate the policy under which access was granted. In the following
    model, I am not considering how the resource is consumed which is very inflexible to monitor in real
    situation. This model tries to provide continuous enforcement where continuous requests for a resource
    are made and each request has some side effect in the system. Fig. 3a. gives a general model for
    continuous enforcement while fig. 3b is specialized model for video streaming service provider.

                                                               I
                                                           S   n
                                                                                                                           G
S                                                          e   s
                                                                                                                           r
                                                           r   t                                   Customer
e                                                                         Customer                                         a
           Mutable              System States                  a                                 status: {New,
r                                                          v              Balance,                                         n
          Attributes               base on                     n                                    reliable,
v                                                          i               Trust,                                          t
                                  attributes                   t                                  Unreliable,
i                                                          c               History
                                                                                                 trustworthy}              /
c                                                          e   S
e                                                                                                                          D
                                                               t
                                                                                                                           e
                                                               r
                                                           G                                                               n
                                 Condition                     e            1.Prefer
                                                           r                                                               y
R        Application                                           a          trustworthy
                               Enforcem ent /              a                                      1.Sufficient
e        Level Policy                                          m           Customer,
                               Access Control                                                      Balance ?               S
q                                                          t                2. Prefer
                                                                                                2. More cond. ?            t
u                                                          n   R         customer with                                     r
e                                                          /   e         more balance                                      a
s                                                          D   q
                  Update M utable Attributes based Per                                                                     m
t                                                          e   u                  Update balance, history etc. based Per
                         Request Processing                                                                                i
                                                           n   e                          Request Processing               n
                                                           y   s
                                                                                                                           g
              General Enforcem ent System(each                 t
                                                                           Enforcement System for Online video
              Service request goes through this
                                                                                    Stream Provider
                          system )
    Fig 3a: General Model for continuous Enforcement                  Fig. 3b: Continuous enforcement model
                                                                       for video streaming service Provider.

    Here we assume that each request is going through the enforcement model. The model has mutable
    attributes which define the current state (and all possible states) for the system. The condition
    enforcement diamond in fig 3a. ensures that any violation of system policy will be detected and any
    further service request will be ignored in such violation cases.

    For a specific application, I have considered a video streaming service provider where each customer
    should have some balance, some trust worthiness, and/or balance history to get service. Possible state /
    status for a customer are new, reliable, unreliable etc. A future request will be allowed or denied based on
    which state the customer is currently in as well as on the policy of the system some of which are
    enumerated in figure 3b.

    References:

    [1] Jaehong Park and Ravi Sandhu. The UCON_ABC Usage Control Model, ACM Transactions on Information and
    System Security, Volume 7, Number 1, February 2004, pages 128-174.

    [2] Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In
    Proceedings 5th International Conference on Availability, Reliability and Security (ARES)

          I have not taken any help on this examination from anybody and have not given any help to
                                                  anybody.
4. The Good Part and Bad Part:

In this paper the authors have nicely identified the scope of their work by identifying the fact that
although there exists de-facto standard for confidentiality and integrity for online banking, there is no
standard scheme for authentication and non-repudiation. Then they presented two solutions for achieving
authentication and non-repudiation. While they have engineered fairly technical solutions, the way they
have presented them is not quite comprehensible and the article would have required more technical
representation and technical analysis of their claim. For example, their approach for certificate-based
solution should be more distinct in the sense what already exists and what they are proposing. The authors
should have also shown attack scenarios that are possible in existing approached but not possible when
their proposed solution is deployed.

Something I have learned from the paper:

In order to protect man-in-the-middle (MITM) attack, this paper has proposed a short time password
scheme based on hardware generated token. Eventually, they have transferred the defense against secret
key tampering on an offline hardwired device (smart card) which is interesting to learn. I have also come
to know about the security concern and measurements for online banking ( for both online & offline )
from this and other papers I have read for answering the question.

Weakness of the paper:

The authors have identified and provided solution for issues like authentication, confidentiality, Integrity
and non-repudiation. But today there exists more sophisticated attack than MITM or SSL certificate
tempering among which MITB (Man-in-the-Browser) is worth to mention. So, they did not cover these
types of client browser specific attacks (ex: XSS, XSRF and many others) although they have brought up
this issues in another paper[4]. It is also reported that [3] a special, dedicated hardware device like smart
card and card reader(additionally other equipments) for online banking may potentially hurt customer
experiences caused by the limited portability of the hardware device.

References:

[1] Read the paper: Hiltgen, A., Kramp, T. and Weigold, T., “Secure Internet banking authentication.” IEEE
Security & Privacy, vol.4, no.2, pp.21-29, March-April 2006.

[2] Shoji Sakurai, Shinobu Ushirozawa, "Input Method against Trojan Horse and Replay Attack "Information
Theory and Information Security (ICmS), pp.3S4-3S9, Jan 2010.

[3] A. Vapen and N. Shahmehri. “Security levels for web authentication using mobile phones.” PrimeLife/IFIP
Summer School Post-proceedings, Springer, 2011 (In Press).

[4] Oppliger, R.; Rytz, R.; Holderegger, T.; “Internet Banking: Client-Side Attacks and Protection Mechanisms.”
Computer (IEEE), 2009, Vol. 42 , No. 6, pp. 27-33.

      I have not taken any help on this examination from anybody and have not given any help to
                                              anybody.

More Related Content

PDF
Near-Far Resistance of MC-DS-CDMA Communication Systems
PDF
The Power-Bandwidth Tradeoff in MIMO Systems
PDF
Bz25454457
PDF
Ber performance analysis of mimo systems using equalization
PDF
Lo2520082015
PPTX
Ad hoc routing
 
PDF
Taller de algebra
PDF
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...
Near-Far Resistance of MC-DS-CDMA Communication Systems
The Power-Bandwidth Tradeoff in MIMO Systems
Bz25454457
Ber performance analysis of mimo systems using equalization
Lo2520082015
Ad hoc routing
 
Taller de algebra
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...

What's hot (14)

PDF
7.Wireless
PDF
Iterative network channel decoding with cooperative space-time transmission
PDF
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
PDF
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
PDF
I0362048053
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
Ks3618311836
PDF
Amcaas Beamforming
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PDF
Mobile computing
PDF
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
PDF
V.karthikeyan published article1
PDF
Bl32401409
PDF
D0511924
7.Wireless
Iterative network channel decoding with cooperative space-time transmission
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
I0362048053
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Ks3618311836
Amcaas Beamforming
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Mobile computing
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
V.karthikeyan published article1
Bl32401409
D0511924
Ad

Viewers also liked (6)

TXT
Recitation
PDF
Branch prediction contest_report
TXT
Recitation
PDF
Transcription Factor DNA Binding Prediction
DOCX
Attribute Based Encryption
Recitation
Branch prediction contest_report
Recitation
Transcription Factor DNA Binding Prediction
Attribute Based Encryption
Ad

Similar to Cyber Security Exam 2 (20)

PDF
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
PDF
A Method of Trust Management in Wireless Sensor Networks
PDF
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PDF
Double layer security using visual cryptography and transform based steganogr...
PDF
J0525460
PDF
Block Image Encryption using Wavelet
PDF
W4301117121
PDF
Optimized rationalize security and efficient data gathering in wireless senso...
PDF
Indoor Localization in Wireless Sensor Networks
PDF
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
PDF
Square grid points coveraged by
PDF
T tmac energy aware sensor mac protocol for
PDF
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
PPTX
PDF
Non standard size image compression with reversible embedded wavelets
PDF
Non standard size image compression with reversible embedded wavelets
PDF
K42016368
PDF
Jaringan Adhoc
DOCX
Design of a rectangular patch antenna
PDF
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
IRJET- Spatial Context Preservation and Propagation - Layer States in Convolu...
A Method of Trust Management in Wireless Sensor Networks
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
Double layer security using visual cryptography and transform based steganogr...
J0525460
Block Image Encryption using Wavelet
W4301117121
Optimized rationalize security and efficient data gathering in wireless senso...
Indoor Localization in Wireless Sensor Networks
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
Square grid points coveraged by
T tmac energy aware sensor mac protocol for
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
Non standard size image compression with reversible embedded wavelets
Non standard size image compression with reversible embedded wavelets
K42016368
Jaringan Adhoc
Design of a rectangular patch antenna
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...

More from UT, San Antonio (20)

PPTX
digital certificate - types and formats
PPTX
Saml metadata
PPTX
Static Analysis with Sonarlint
PPTX
Shellshock- from bug towards vulnerability
PPT
Abac17 prosun-slides
PPT
Abac17 prosun-slides
PDF
Big Data Processing: Performance Gain Through In-Memory Computation
PDF
Enumerated authorization policy ABAC (EP-ABAC) model
PDF
Where is my Privacy presentation slideshow (one page only)
PDF
Three month course
PDF
One month-syllabus
PPT
Zerovm backgroud
PPTX
Security_of_openstack_keystone
PDF
Research seminar group_1_prosunjit
PPT
Final Project Transciption Factor DNA binding Prediction
PPT
Transcription Factor DNA Binding Prediction
PPTX
Secure webbrowsing 1
PPT
On the incoherencies in web browser access control
PPT
Cultural conflict
PPTX
Pair programming
digital certificate - types and formats
Saml metadata
Static Analysis with Sonarlint
Shellshock- from bug towards vulnerability
Abac17 prosun-slides
Abac17 prosun-slides
Big Data Processing: Performance Gain Through In-Memory Computation
Enumerated authorization policy ABAC (EP-ABAC) model
Where is my Privacy presentation slideshow (one page only)
Three month course
One month-syllabus
Zerovm backgroud
Security_of_openstack_keystone
Research seminar group_1_prosunjit
Final Project Transciption Factor DNA binding Prediction
Transcription Factor DNA Binding Prediction
Secure webbrowsing 1
On the incoherencies in web browser access control
Cultural conflict
Pair programming

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
The various Industrial Revolutions .pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Modernising the Digital Integration Hub
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Benefits of Physical activity for teenagers.pptx
2018-HIPAA-Renewal-Training for executives
Getting started with AI Agents and Multi-Agent Systems
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Zenith AI: Advanced Artificial Intelligence
The influence of sentiment analysis in enhancing early warning system model f...
A review of recent deep learning applications in wood surface defect identifi...
The various Industrial Revolutions .pptx
sbt 2.0: go big (Scala Days 2025 edition)
Custom Battery Pack Design Considerations for Performance and Safety
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Modernising the Digital Integration Hub
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Module 1.ppt Iot fundamentals and Architecture
CloudStack 4.21: First Look Webinar slides
A comparative study of natural language inference in Swahili using monolingua...
NewMind AI Weekly Chronicles – August ’25 Week III
OpenACC and Open Hackathons Monthly Highlights July 2025
Benefits of Physical activity for teenagers.pptx

Cyber Security Exam 2

  • 1. Submitted By: Prosunjit Biswas (@01232785) 1. Difference between Covert Channel & Side Channel: In the simplest definition, ‘A communication channel is covert if it is neither designed nor intended to transfer information at all’ [1]. A more compelling definition appears as – ‘Given a security model M and its interpretation I(M) in an operating system and any potential communication between two subjects I(Sh) and I(Si) of ((M) is covert only if the communication between the subjects Sh and Si of the model of M is illegal in M’ [2]. On the other hand, “Side channel leaks S Subjects implementation-specific characteristics to S i d i recover the secret parameters involved in d e e the computation and specific to given C C implementation.”[3] Figure 1. shows the h h a …….. : a position of covert channel and side n convert n channel n channel in a system. n e Projection Model e l l Fig 1: Side channel & Covert channel. Environment Side Effect (Heat, Sound, Power etc) i) Covert channel is created inside a protection model where either that channel was not identified or not intended for communication where as side channel stays outside the protection model based on the side effect of the model with the environment (ex: electromagnetic emission). ii) Covert channel may require cooperating sender and receiver where as side channel do not require sender. Conversion between Covert channel and Side channel: As shown in figure 1b, we can convert side- channel into covert channel and vice versa. M We see that for model M1, C1 is side channel o Information Leaking d because it stays outside the model but if we C1 Side channel for M1 / Covert channel for M2 e build another protection model M2 including l Protection M1, then C1 becomes the Covert channel for M Model (M1) M2 by leaking information from a subject in M1 2 to other subject outside m1. Thus by changing the protection model from M1 to M2 we can convert between side channel into covert channel. Similarly, we can do the opposite. Fig 1b: Conversion between side & Covert Channel References: [1] B.W. Lampson, "A Noto on the Confinement Problem," Communications ACM 16 (1973). 613-615. [2] C. Tsai and V. D. Gligor, "A Bandwidth Computation Model for Covert Storage Channels and its Applications," IEEE Symposium on Security and Privacy, 1988. [3] F.-X. Standaert. Introduction to side-channel attacks. In I. M. Verbauwhede, Secure Integrated Circuit.2009 I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 2. 2. Intrusion Detection & Intrusion Prevention System: Although both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) analyze the traffic and work based on different predefined rules, there are fundamental differences on how data they work and on action they can take. Figure 2. Shows the scope of both system in some great details. Fig 2: Breakdown of Intrusion Detection and Intrusion Prevention System Differences: i) IPS works with real traffic which means that the traffic, if allowed, is feed to real devices where as IDS works with the copy of the data, in the sense that even if we have IDS setup to update firewall with blocking rules, the initial attack packet has already gone through. ii) IDS is a passive device only used for loging/reporting purpose where as IPS acts as an active device which can terminate network connection or user sessions based on the need of IPS system. Implications of Base-rate fallacy on IPS: Similar to the base-rate fallacy in IDS, IPS effectiveness depends on how we can improve false alarm rate. If we use an IPS with high false alarm rate, eventually it will hurt system performance badly by filtering / stopping legitimate traffic. So, the impact of base rate fallacy on IPS is much more critical than its impact on IDS. Reference: [1] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of the 6th ACM Conference on Cornpurer and Communications Securiry,1999. [2] “IDS vs IPS”, available at : http://blog.inetu.net/2011/02/intrusion-detection-or-prevention-ids-vs-ips/ [3] “IDS vs IPS”, available at : http://www.focus.com/fyi/ids-vs-ips/ I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 3. 3. Continuous enforcement ensures that the control on a resource stays even after access to that resource is given to a user. Thus, it is required to monitor consumption of the resource or subsequent request for consumption so that it does not violate the policy under which access was granted. In the following model, I am not considering how the resource is consumed which is very inflexible to monitor in real situation. This model tries to provide continuous enforcement where continuous requests for a resource are made and each request has some side effect in the system. Fig. 3a. gives a general model for continuous enforcement while fig. 3b is specialized model for video streaming service provider. I S n G S e s r r t Customer e Customer a Mutable System States a status: {New, r v Balance, n Attributes base on n reliable, v i Trust, t attributes t Unreliable, i c History trustworthy} / c e S e D t e r G n Condition e 1.Prefer r y R Application a trustworthy Enforcem ent / a 1.Sufficient e Level Policy m Customer, Access Control Balance ? S q t 2. Prefer 2. More cond. ? t u n R customer with r e / e more balance a s D q Update M utable Attributes based Per m t e u Update balance, history etc. based Per Request Processing i n e Request Processing n y s g General Enforcem ent System(each t Enforcement System for Online video Service request goes through this Stream Provider system ) Fig 3a: General Model for continuous Enforcement Fig. 3b: Continuous enforcement model for video streaming service Provider. Here we assume that each request is going through the enforcement model. The model has mutable attributes which define the current state (and all possible states) for the system. The condition enforcement diamond in fig 3a. ensures that any violation of system policy will be detected and any further service request will be ignored in such violation cases. For a specific application, I have considered a video streaming service provider where each customer should have some balance, some trust worthiness, and/or balance history to get service. Possible state / status for a customer are new, reliable, unreliable etc. A future request will be allowed or denied based on which state the customer is currently in as well as on the policy of the system some of which are enumerated in figure 3b. References: [1] Jaehong Park and Ravi Sandhu. The UCON_ABC Usage Control Model, ACM Transactions on Information and System Security, Volume 7, Number 1, February 2004, pages 128-174. [2] Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing. In Proceedings 5th International Conference on Availability, Reliability and Security (ARES) I have not taken any help on this examination from anybody and have not given any help to anybody.
  • 4. 4. The Good Part and Bad Part: In this paper the authors have nicely identified the scope of their work by identifying the fact that although there exists de-facto standard for confidentiality and integrity for online banking, there is no standard scheme for authentication and non-repudiation. Then they presented two solutions for achieving authentication and non-repudiation. While they have engineered fairly technical solutions, the way they have presented them is not quite comprehensible and the article would have required more technical representation and technical analysis of their claim. For example, their approach for certificate-based solution should be more distinct in the sense what already exists and what they are proposing. The authors should have also shown attack scenarios that are possible in existing approached but not possible when their proposed solution is deployed. Something I have learned from the paper: In order to protect man-in-the-middle (MITM) attack, this paper has proposed a short time password scheme based on hardware generated token. Eventually, they have transferred the defense against secret key tampering on an offline hardwired device (smart card) which is interesting to learn. I have also come to know about the security concern and measurements for online banking ( for both online & offline ) from this and other papers I have read for answering the question. Weakness of the paper: The authors have identified and provided solution for issues like authentication, confidentiality, Integrity and non-repudiation. But today there exists more sophisticated attack than MITM or SSL certificate tempering among which MITB (Man-in-the-Browser) is worth to mention. So, they did not cover these types of client browser specific attacks (ex: XSS, XSRF and many others) although they have brought up this issues in another paper[4]. It is also reported that [3] a special, dedicated hardware device like smart card and card reader(additionally other equipments) for online banking may potentially hurt customer experiences caused by the limited portability of the hardware device. References: [1] Read the paper: Hiltgen, A., Kramp, T. and Weigold, T., “Secure Internet banking authentication.” IEEE Security & Privacy, vol.4, no.2, pp.21-29, March-April 2006. [2] Shoji Sakurai, Shinobu Ushirozawa, "Input Method against Trojan Horse and Replay Attack "Information Theory and Information Security (ICmS), pp.3S4-3S9, Jan 2010. [3] A. Vapen and N. Shahmehri. “Security levels for web authentication using mobile phones.” PrimeLife/IFIP Summer School Post-proceedings, Springer, 2011 (In Press). [4] Oppliger, R.; Rytz, R.; Holderegger, T.; “Internet Banking: Client-Side Attacks and Protection Mechanisms.” Computer (IEEE), 2009, Vol. 42 , No. 6, pp. 27-33. I have not taken any help on this examination from anybody and have not given any help to anybody.