Stopping AiTM attacks: The defenses that actually work after authentication succeeds