In spite of having received comparatively little attention from the security research community, man-at-the-end attacks can have serious consequences. For example, on an individual scale they can violate the privacy and integrity of medical records and other sensitive personal data; on a larger scale, such attacks can cripple national infrastructure (such as the power grid and the Internet itself).
Traditional defensive approaches, where the sensitive software hides behind a defensive wall (e.g., firewalls, malware scanners, intrusion-detection systems), are not applicable in this scenario since the attacker has physical access to the software, the operating system on which it runs, as well as the underlying hardware.
Webmaster: Christian Collberg