메뉴 건너뛰기




Volumn 8, Issue 4, 2008, Pages

Security and identification indicators for browsers against spoofing and phishing attacks

Author keywords

Human computer interaction; Phishing; Secure usability; Web spoofing

Indexed keywords

KNOWLEDGE MANAGEMENT;

EID: 54049142548     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/1391949.1391950     Document Type: Article
Times cited : (84)

References (60)
  • 1
    • 34548344520 scopus 로고    scopus 로고
    • ANTI-PHISHING WORKING GROUP
    • ANTI-PHISHING WORKING GROUP. 2006. Phishing activity trends report. http://www.antiphishing.org/reports/ apwg_report_May2006.pdf.
    • (2006) Phishing activity trends report
  • 2
    • 54049156094 scopus 로고    scopus 로고
    • ANTI-PHISHING WORKING GROUP
    • ANTI-PHISHING WORKING GROUP. 2005. Phishing archive. http://www.antiphishing.org/.
    • (2005) Phishing archive
  • 3
    • 14544299579 scopus 로고    scopus 로고
    • BONEH, D., SHACHAM, H., AND RESCROLA, E. 2004. Client side caching for TLS. ACM Trans. Inf. Syst. Security 7, 4 (Nov.), 553-575.
    • BONEH, D., SHACHAM, H., AND RESCROLA, E. 2004. Client side caching for TLS. ACM Trans. Inf. Syst. Security 7, 4 (Nov.), 553-575.
  • 5
    • 54049124489 scopus 로고    scopus 로고
    • ITIBANK CORPORATION
    • ITIBANK CORPORATION. 2004. Learn about or report fraudulent e-mails, http://www.citibank.coin/domain/spoof/report_abuse.htm.
    • (2004) Learn about or report fraudulent e-mails
  • 6
    • 54049112231 scopus 로고    scopus 로고
    • Petname tool: Enabling Web site recognition using the existing SSL infrastructure
    • LOSE, T. 2006. Petname tool: Enabling Web site recognition using the existing SSL infrastructure. In W3C Workshop on Transparency and Usability of Web Authentication, http://www.w3.org/2005/Security/usability- ws/papers/02-hp-petname/.
    • (2006) W3C Workshop on Transparency and Usability of Web Authentication
    • LOSE, T.1
  • 9
    • 0033295882 scopus 로고    scopus 로고
    • The nature of a usable PKI
    • ELLISON, C. 1999. The nature of a usable PKI. Comput. Netw. 31, 823-830.
    • (1999) Comput. Netw , vol.31 , pp. 823-830
    • ELLISON, C.1
  • 10
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public key infrastructure
    • ELLISON, C. AND SCHNEIER, B. 2000. Ten risks of PKI: What you're not being told about public key infrastructure. Comput. Security J. 16, 1, 1-7. http://www.schneier.com/paper-pki.html.
    • (2000) Comput. Security J , vol.16 , Issue.1 , pp. 1-7
    • ELLISON, C.1    SCHNEIER, B.2
  • 12
    • 54049088937 scopus 로고    scopus 로고
    • EMIGH, A. 2005. Online identity theft: Technology, chokepoints and countermeasures. Rep., Department of Homeland Security- SRI International Identity Theft Technology Council. October. http://www.antiphishing.org/ Phishing-dhs-report.pdf.
    • EMIGH, A. 2005. Online identity theft: Technology, chokepoints and countermeasures. Rep., Department of Homeland Security- SRI International Identity Theft Technology Council. October. http://www.antiphishing.org/ Phishing-dhs-report.pdf.
  • 13
    • 54049112229 scopus 로고    scopus 로고
    • FELTEN, E. W., BALFANZ, D., DEAN, D., AND WALLACH, D. S. 1997. Web spoofing: An Internet con game. In Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD. Also Tech. Rep. 540-96, Department of Computer Science, Princeton University. October.
    • FELTEN, E. W., BALFANZ, D., DEAN, D., AND WALLACH, D. S. 1997. Web spoofing: An Internet con game. In Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD. Also Tech. Rep. 540-96, Department of Computer Science, Princeton University. October.
  • 14
    • 70349318955 scopus 로고    scopus 로고
    • Better Website identification and extended validation certificates in IE7 and other browsers
    • FRANCO, R. 2004. Better Website identification and extended validation certificates in IE7 and other browsers. In Microsoft Developer Network's IEBlog. http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx.
    • (2004) Microsoft Developer Network's IEBlog
    • FRANCO, R.1
  • 17
    • 54049136023 scopus 로고    scopus 로고
    • Method and apparatus for authentication of users and Web sites
    • U.S. patent number 7100049
    • GASPARINI, L. A. AND GOTLIEB, C. E. 2006. Method and apparatus for authentication of users and Web sites. U.S. patent number 7100049.
    • (2006)
    • GASPARINI, L.A.1    GOTLIEB, C.E.2
  • 18
    • 54049155721 scopus 로고    scopus 로고
    • personal communication
    • GRIGG, I. 2004a. personal communication.
    • (2004)
    • GRIGG, I.1
  • 24
    • 0038442927 scopus 로고    scopus 로고
    • Payments and banking with mobile personal devices
    • HERZBERG, A. 2003. Payments and banking with mobile personal devices. Commun. ACM 46, 5, 53-58.
    • (2003) Commun. ACM , vol.46 , Issue.5 , pp. 53-58
    • HERZBERG, A.1
  • 25
    • 54049136471 scopus 로고    scopus 로고
    • HERZBERG, A. AND JBARA, A. 2004. TrustBar: Protecting (even naïve) Web users from spoofing and phishing attacks. Rep. 2004/155, Cryptology ePrint Archive. http://eprint.iacr.org.
    • HERZBERG, A. AND JBARA, A. 2004. TrustBar: Protecting (even naïve) Web users from spoofing and phishing attacks. Rep. 2004/155, Cryptology ePrint Archive. http://eprint.iacr.org.
  • 26
    • 0031676704 scopus 로고    scopus 로고
    • Surf'n'Sign: Client signatures on Web documents
    • HERZBERG, A. AND NAOR, D. 1998. Surf'n'Sign: Client signatures on Web documents. IBM Syst. J. 37, 1, 61-71.
    • (1998) IBM Syst. J , vol.37 , Issue.1 , pp. 61-71
    • HERZBERG, A.1    NAOR, D.2
  • 32
    • 0033749074 scopus 로고    scopus 로고
    • Reasoning about public-key certification: On bindings between entities and public keys
    • Apr
    • KOHLAS AND MAURER, U. 2000. Reasoning about public-key certification: On bindings between entities and public keys. IEEE J. Selected Areas Commun. 18, 4 (Apr.).
    • (2000) IEEE J. Selected Areas Commun , vol.18 , pp. 4
    • KOHLAS1    MAURER, U.2
  • 33
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • Jul
    • KORMANN, D. P. AND RUBIN, A. D. 2000. Risks of the passport single signon protocol. Comput. Netw. (Jul.).
    • (2000) Comput. Netw
    • KORMANN, D.P.1    RUBIN, A.D.2
  • 34
    • 0005826403 scopus 로고    scopus 로고
    • SEMPER - Secure Electronic Marketplace for Europe
    • ACOSTE, G, PFITZMANN, B, STEINER, M, AND WAIDNER, M, eds, Springer
    • ACOSTE, G., PFITZMANN, B., STEINER, M., AND WAIDNER, M., eds. 2000. SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science, vol. 1854. Springer.
    • (2000) Lecture Notes in Computer Science , vol.1854
  • 35
    • 35248863938 scopus 로고    scopus 로고
    • Cut-and-Paste attacks with Java
    • Proceedings of the 5th International Conference on Information Security and Cryptology ICISC, Springer
    • EFRANC, S. AND NACCACHE, D. 2003. Cut-and-Paste attacks with Java. In Proceedings of the 5th International Conference on Information Security and Cryptology (ICISC). Lecture Notes in Computer Science, vol. 2587. Springer, 1-15.
    • (2003) Lecture Notes in Computer Science , vol.2587 , pp. 1-15
    • EFRANC, S.1    NACCACHE, D.2
  • 36
    • 0242277405 scopus 로고    scopus 로고
    • Trust on Web browser: Attack vs. defense
    • Proceedings of the International Conference on Applied Cryptography and Network Security ACNS, Kunming, Springer
    • I, T. AND YONGDONG, W. 2003. Trust on Web browser: Attack vs. defense. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), Kunming, China. Lecture Notes in Computer Science, Springer.
    • (2003) China. Lecture Notes in Computer Science
    • LI, T.1    YONGDONG, W.2
  • 37
    • 25144432071 scopus 로고    scopus 로고
    • Phishing attack victims likely targets for identity theft
    • Gartner Research. May
    • ITAN, A. 2004. Phishing attack victims likely targets for identity theft. Gartner FirstTake Rep. FT-22-8873. Gartner Research. May.
    • (2004) Gartner FirstTake Rep. FT-22-8873
    • ITAN, A.1
  • 40
    • 33645418328 scopus 로고    scopus 로고
    • ICROSOFT CORPORATION
    • ICROSOFT CORPORATION. 2004. The coordinated spam reduction initiative. http://www.microsoft.com/downloads/details.aspx?familyid= 5577782e-462d-4bbe-92e5-b38c575229e4&sdisplaylang=en.
    • (2004) The coordinated spam reduction initiative
  • 42
    • 0004257599 scopus 로고
    • Academic Press, Boston, MA. ISBN 0-12-518405-0
    • NIELSEN, J. 1993. Usability Engineering. Academic Press, Boston, MA. ISBN 0-12-518405-0.
    • (1993) Usability Engineering
    • NIELSEN, J.1
  • 44
    • 54049157428 scopus 로고    scopus 로고
    • Earlier version: Trusting mobile user devices and security modules. IEEE Comput. 30, 2 (Feb.), 61-68.
    • Earlier version: Trusting mobile user devices and security modules. IEEE Comput. 30, 2 (Feb.), 61-68.
  • 47
    • 54049130821 scopus 로고    scopus 로고
    • SANTESSON, S., HOUSLEY, R., AND FREEMAN, T 2004. Internet X.509 public key infrastructure: Logotypes in X.509 certificates. Internet RFC 3709, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3709.txt.
    • SANTESSON, S., HOUSLEY, R., AND FREEMAN, T 2004. Internet X.509 public key infrastructure: Logotypes in X.509 certificates. Internet RFC 3709, Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3709.txt.
  • 49
    • 33745608769 scopus 로고    scopus 로고
    • Multiple browser URI display obfuscation weakness
    • SECURITY FOCUS. 2003. Multiple browser URI display obfuscation weakness. http://www.securityfocus.com/bid/9182/discussion/.
    • (2003)
  • 55
    • 54049089216 scopus 로고    scopus 로고
    • YAHOO, INCORPORATED. 2006. Give password scams the boot with personalized sign-in seals. https://protect.login.yahoo.com/.
    • YAHOO, INCORPORATED. 2006. Give password scams the boot with personalized sign-in seals. https://protect.login.yahoo.com/.
  • 56
    • 23244459906 scopus 로고    scopus 로고
    • YE, E. Z., YUAN, Y., AND ANTHONY, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Security 8, 2 (May), 153-186.
    • YE, E. Z., YUAN, Y., AND ANTHONY, D. 2005. Trusted paths for browsers. ACM Trans. Inf. Syst. Security 8, 2 (May), 153-186.
  • 57
    • 2642577193 scopus 로고    scopus 로고
    • Web spoofing revisited: SSL and beyond
    • Tech. Rep. TR2002-417. February
    • YE, E. Z., YUAN, Y., AND SMITH, S. 2002. Web spoofing revisited: SSL and beyond. Tech. Rep. TR2002-417. February.
    • (2002)
    • YE, E.Z.1    YUAN, Y.2    SMITH, S.3
  • 58
    • 54049149759 scopus 로고    scopus 로고
    • User interaction design for secure systems
    • Tech. Rep. CSD-02-1184, University of California, Berkeley. May
    • YEE, K. P. 2002. User interaction design for secure systems. Tech. Rep. CSD-02-1184, University of California, Berkeley. May.
    • (2002)
    • YEE, K.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.