메뉴 건너뛰기




Volumn , Issue , 2007, Pages 71-85

A systematic approach to uncover security flaws in GUI logic

Author keywords

End to end security; Formal methods; GUI logic flaw; HTML; Visual spoofing

Indexed keywords

CASE BASED REASONING; FORMAL LOGIC; GRAPHICAL USER INTERFACES; HTML; HUMAN COMPUTER INTERACTION; SOFTWARE RELIABILITY;

EID: 34548780878     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.6     Document Type: Conference Paper
Times cited : (44)

References (27)
  • 4
    • 33751067472 scopus 로고    scopus 로고
    • Richard S. Cox, Jacob G. Hansen, Steven D. Gribble, and Henry M. Levy: A Safety-Oriented Platform for Web Applications, IEEE Symposium on Security and Privacy, 2006
    • Richard S. Cox, Jacob G. Hansen, Steven D. Gribble, and Henry M. Levy: "A Safety-Oriented Platform for Web Applications," IEEE Symposium on Security and Privacy, 2006
  • 12
    • 0027113376 scopus 로고
    • Conditional Rewriting Logic as a United Model of Concurrency
    • José Meseguer. "Conditional Rewriting Logic as a United Model of Concurrency". Theoretical Computer Science, 96(1): 73-155, 1992.
    • (1992) Theoretical Computer Science , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 13
    • 84923564816 scopus 로고    scopus 로고
    • Finding Security Vulnerabilities in Java Applications with Static Analysis
    • Benjamin Livshits, Monica S. Lam. "Finding Security Vulnerabilities in Java Applications with Static Analysis," USENIX Security Symposium, 2005.
    • (2005) USENIX Security Symposium
    • Livshits, B.1    Lam, M.S.2
  • 15
    • 84955602379 scopus 로고
    • Formal Verification of Cryptographic Protocols: A Survey
    • Springer
    • Catherine Meadows. Formal Verification of Cryptographic Protocols: A Survey. Lecture Notes in Computer Science, 917, 135-150, 1995, Springer.
    • (1995) Lecture Notes in Computer Science , vol.917 , pp. 135-150
    • Meadows, C.1
  • 16
    • 34548797457 scopus 로고    scopus 로고
    • The MSDN Library. Changing Element Styles. http://msdn.microsoft.com/
    • The MSDN Library. "Changing Element Styles". http://msdn.microsoft.com/
  • 17
    • 34548742655 scopus 로고    scopus 로고
    • The MSDN Library. OLE Background, http://msdn.microsoft.com/ library/default.asp?url=/library/en-us/vccore/html/_core_ole_background. asp
    • The MSDN Library. "OLE Background," http://msdn.microsoft.com/ library/default.asp?url=/library/en-us/vccore/html/_core_ole_background.asp
  • 19
    • 84863469085 scopus 로고    scopus 로고
    • Stronger Password Authentication Using Browser Extensions
    • Blake Ross, Collin Jackson, Nicholas Miyake, et al. "Stronger Password Authentication Using Browser Extensions". Usenix Security Symposium, 2005.
    • (2005) Usenix Security Symposium
    • Ross, B.1    Jackson, C.2    Miyake, N.3
  • 20
    • 34548747837 scopus 로고    scopus 로고
    • SpoofStick. http://www.spoofstick.com/
    • SpoofStick
  • 21
    • 34548747262 scopus 로고    scopus 로고
    • Firefox Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/ bid. Bug IDs: 10532, 10832, 12153, 12234, 12798, 14526, 14919
    • Firefox Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/ bid. Bug IDs: 10532, 10832, 12153, 12234, 12798, 14526, 14919
  • 22
    • 34548739360 scopus 로고    scopus 로고
    • Internet Explorer Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 3469, 10023, 10943, 11561, 11590, 11851, 11855, 1254.
    • Internet Explorer Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 3469, 10023, 10943, 11561, 11590, 11851, 11855, 1254.
  • 23
    • 34548753198 scopus 로고    scopus 로고
    • Netscape Navigator Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 7564, 10389
    • Netscape Navigator Visual Spoofing Flaws. Bugtraq list, http://securityfocus.com/bid. Bug IDs: 7564, 10389
  • 25
    • 85084161317 scopus 로고    scopus 로고
    • E. Ye, S.W. Smith. Trusted Paths for Browsers. 11th Usenix Security Symposium. August 2002. (Also, E. Ye, Y.Yuan, S. W. Smith. Web Spoofing Revisited: SSL and Beyond, Technical Report TR2002-417, Dartmouth College. February 2002.)
    • E. Ye, S.W. Smith. "Trusted Paths for Browsers." 11th Usenix Security Symposium. August 2002. (Also, E. Ye, Y.Yuan, S. W. Smith. "Web Spoofing Revisited: SSL and Beyond," Technical Report TR2002-417, Dartmouth College. February 2002.)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.