-
2
-
-
0005785915
-
Web spoofing: An Internet Con Game
-
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach, "Web spoofing: An Internet Con Game," 20th National Information Systems Security Conference, 1997. http://www.cs.princeton.edu/sip/pub/ spoofing.html
-
(1997)
20th National Information Systems Security Conference
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
4
-
-
33749063674
-
The homograph attack
-
Evgeniy Gabrilovich, and Alex Gontmakher, "The homograph attack," Communications of ACM, 45(2):128, 2002.
-
(2002)
Communications of ACM
, vol.45
, Issue.2
, pp. 128
-
-
Gabrilovich, E.1
Gontmakher, A.2
-
5
-
-
48349121472
-
Using Java in anti DNS-pinning attacks
-
1566124/,February2007
-
Martin Johns, "Using Java in anti DNS-pinning attacks," http://shampoo.antville.org/stories/1566124/,February2007.
-
-
-
Johns, M.1
-
6
-
-
25144432071
-
Phishing Attack Victims Likely Targets for Identity Theft
-
Gartner Research
-
Avivah Litan, "Phishing Attack Victims Likely Targets for Identity Theft," in Gartner First Take FT-22-8873. 2004, Gartner Research
-
(2004)
Gartner First Take FT-22-8873
-
-
Litan, A.1
-
7
-
-
48249132176
-
-
Microsoft. Microsoft security bulletin MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard,March 2001. http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx
-
Microsoft. Microsoft security bulletin MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard,March 2001. http://www.microsoft.com/technet/security/Bulletin/MS01-017.mspx
-
-
-
-
9
-
-
48249116513
-
-
Russell Housley, Warwick Ford, Tim Polk, and David Solo, Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile, 2002. http://tools.ietf.org/html/rfc3280
-
Russell Housley, Warwick Ford, Tim Polk, and David Solo, "Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile," 2002. http://tools.ietf.org/html/rfc3280
-
-
-
-
10
-
-
84923564816
-
Finding security vulnerabilities in Java applications using static analysis
-
V. Benjamin Livshits, and Monica S. Lam, "Finding security vulnerabilities in Java applications using static analysis," USENIX Security Sym., pp.271-286, 2005.
-
(2005)
USENIX Security Sym
, pp. 271-286
-
-
Benjamin Livshits, V.1
Lam, M.S.2
-
11
-
-
25144524330
-
A Browser Plug-in Solution to the Unique Password Problem
-
Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, and John C. Mitchell, "A Browser Plug-in Solution to the Unique Password Problem," Usenix Security Symposium, 2005.
-
(2005)
Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
12
-
-
48249153527
-
-
mozilla.dev.security, VeriSign Class 3 Secure Server CA?, http://groups.google.com/group/mozilla.dev.security/browse_thread/ threa%d/6830a8566de24547/0be9dea1c274d0c5, March 2007.
-
mozilla.dev.security, "VeriSign Class 3 Secure Server CA?," http://groups.google.com/group/mozilla.dev.security/browse_thread/ threa%d/6830a8566de24547/0be9dea1c274d0c5, March 2007.
-
-
-
-
13
-
-
48249119288
-
-
A. Freier, P. Kariton, and P. Kocher, The SSL Protocol: Version 3.0, Netscape communications, Inc, 1996
-
A. Freier, P. Kariton, and P. Kocher, "The SSL Protocol: Version 3.0," Netscape communications, Inc., 1996.
-
-
-
-
14
-
-
0242277405
-
Trust on Web Browser: Attack vs. Defense
-
First MiAn International Conference on Applied Cryptography and Network Security
-
Tieyan Li, and Yongdong Wu, "Trust on Web Browser: Attack vs. Defense," First MiAn International Conference on Applied Cryptography and Network Security, LNCS 2846, pp.241-253, 2003.
-
(2003)
LNCS
, vol.2846
, pp. 241-253
-
-
Li, T.1
Wu, Y.2
-
15
-
-
48249105616
-
Covert Distributed Computing Using Java Through Web Spoofing
-
Jeffrey Horton, and Jennifer Seberry, "Covert Distributed Computing Using Java Through Web Spoofing," ACISP, pp.48-57, 1998. http://www.uow.edu.au/jennie/WEB/JavaDistComp.ps.
-
(1998)
ACISP
, pp. 48-57
-
-
Horton, J.1
Seberry, J.2
-
17
-
-
0038726078
-
Users' Conceptions of Web Security: A Comparative Study
-
Batya Friedman, David Hurley, Daniel Howe, Edward Felten, and Helen Nissenbaum, "Users' Conceptions of Web Security: A Comparative Study," Conference on Human Factors in Computing Systems, pp.746-747, 2002.
-
(2002)
Conference on Human Factors in Computing Systems
, pp. 746-747
-
-
Friedman, B.1
Hurley, D.2
Howe, D.3
Felten, E.4
Nissenbaum, H.5
-
19
-
-
48249096088
-
-
Security Space and E-Soft, Secure Server Survey, http://www.securityspace.com/_survey/sdata/200704/certca.html, May 2007.
-
Security Space and E-Soft, "Secure Server Survey," http://www.securityspace.com/_survey/sdata/200704/certca.html, May 2007.
-
-
-
-
23
-
-
48249092161
-
-
RSA Security Inc
-
RSA Security Inc, "SecurID product description," http://rsasecurity.com/node.asp?id=1156.
-
SecurID product description
-
-
-
24
-
-
48649102499
-
The Design and Development of an Undercover Multipurpose Anti-Spoofing Kit (UnMask)
-
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes,Wayne Liu, Shahank Sahai, and Zhenghui Zhu,"The Design and Development of an Undercover Multipurpose Anti-Spoofing Kit (UnMask)," 23rd Annual Computer Security Applications Conference, 2007.
-
(2007)
23rd Annual Computer Security Applications Conference
-
-
Aggarwal, S.1
Bali, J.2
Duan, Z.3
Kermes, L.4
Liu, W.5
Sahai, S.6
Zhu, Z.7
-
25
-
-
84958955276
-
-
M. Burnside, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, and Ronald Rivest, The untrusted computer prolem and camera-based authentication, International Conference on Pervasive Computing, LNCS 2414, pp.114-124, 2002.
-
M. Burnside, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk, Srinivas Devadas, and Ronald Rivest, "The untrusted computer prolem and camera-based authentication," International Conference on Pervasive Computing, LNCS 2414, pp.114-124, 2002.
-
-
-
-
26
-
-
48249155513
-
-
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, and Marten van Dijk, Visual Crypto Displays enabling Secure Communications, Proceeding of First International Conference on Security in Pervasive Computing, pp.12-14, 2003.
-
Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, and Marten van Dijk, "Visual Crypto Displays enabling Secure Communications," Proceeding of First International Conference on Security in Pervasive Computing, pp.12-14, 2003.
-
-
-
-
28
-
-
23244459906
-
Trusted Paths for Browsers
-
Eileen Zishuang Ye, and Sean Smith, "Trusted Paths for Browsers," ACM Transactions on Information and System Security,8(2 ):153-186, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 153-186
-
-
Zishuang Ye, E.1
Smith, S.2
-
29
-
-
48249084321
-
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. http Authentication: Basic and Digest Access Authentication, June 1999. http://www.ietf.org/rfc/rfc2617.txt.
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. http Authentication: Basic and Digest Access Authentication, June 1999. http://www.ietf.org/rfc/rfc2617.txt.
-
-
-
-
31
-
-
24644478206
-
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
-
Information Security Practice and ExperienceISPEC
-
Andre Adelsbach, Sebastian Gajek, and Jorg Schwenk, "Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures," Information Security Practice and Experience(ISPEC), LNCS 3469, pp.204-216, 2005.
-
(2005)
LNCS
, vol.3469
, pp. 204-216
-
-
Adelsbach, A.1
Gajek, S.2
Schwenk, J.3
-
32
-
-
33745599108
-
Preventing Web-Spoofing with Automatic Detecting Security Indicator, ISPEC
-
Fang Qi, Tieyan Li, Feng Bao, and Yongdong Wu, "Preventing Web-Spoofing with Automatic Detecting Security Indicator," ISPEC, LNCS 3903, pp. 112-122, 2006.
-
(2006)
LNCS
, vol.3903
, pp. 112-122
-
-
Qi, F.1
Li, T.2
Bao, F.3
Wu, Y.4
-
34
-
-
33846469356
-
-
Neil Chou, Robert Ledesma, Yuka Teraguchi, Dan Boneh, and John C. Mitchell, "Client Side Defense Against Web-based Identity Theft," http://crypto.stanford.edu/SpoofGuard/#publications
-
Client Side Defense Against Web-based Identity Theft
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
35
-
-
33751030004
-
Cache Cookies for Browser Authentication
-
Ari Juels, Markus Jakobsson, and Tom N. Jagatic, "Cache Cookies for Browser Authentication," IEEE Symp. on Security and Privacy, pp.301-305, 2006.
-
(2006)
IEEE Symp. on Security and Privacy
, pp. 301-305
-
-
Juels, A.1
Jakobsson, M.2
Jagatic, T.N.3
-
37
-
-
0016555241
-
The protection of information in computer systems
-
Sept
-
J. H. Saltzer, and M. D. Schroeder, "The protection of information in computer systems," Proceedings of the IEEE, 63(9 :1278-308, Sept. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
|