메뉴 건너뛰기




Volumn 28, Issue 1-2, 2009, Pages 63-71

Why Johnny can't surf (safely)? Attacks and defenses for web users

Author keywords

Network security; Phishing; Secure login; Secure usability; Spoofing; Web security

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; INTERNET; NETWORK SECURITY; WEBSITES; WORLD WIDE WEB;

EID: 57849132173     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.09.007     Document Type: Article
Times cited : (39)

References (22)
  • 2
    • 0032669778 scopus 로고    scopus 로고
    • Apostolopoulos G, Peris V, Saha D. Transport layer security: how much does it really cost? In: INFOCOM'99, 18th annual joint conference of the IEEE Computer and Communications Societies; 1999. p. 717-25.
    • Apostolopoulos G, Peris V, Saha D. Transport layer security: how much does it really cost? In: INFOCOM'99, 18th annual joint conference of the IEEE Computer and Communications Societies; 1999. p. 717-25.
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology - Eurocrypt 2000 Proceedings. Lecture Notes in Computer Science, vol. 1807, Springer, Berlin, 2000. pp. 139-55.
    • Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology - Eurocrypt 2000 Proceedings. Lecture Notes in Computer Science, vol. 1807, Springer, Berlin, 2000. pp. 139-55.
  • 4
    • 57849165199 scopus 로고    scopus 로고
    • Close T. Petname tool: enabling web site recognition using the existing SSL infrastructure. In: W3C workshop on transparency and usability of web authentication, New York City. Available from: ; March 2006.
    • Close T. Petname tool: enabling web site recognition using the existing SSL infrastructure. In: W3C workshop on transparency and usability of web authentication, New York City. Available from: ; March 2006.
  • 5
    • 33745816410 scopus 로고    scopus 로고
    • Dhamija R, Tygar JD, Hearst M. Why phishing works. In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal, Quebec, Canada; 2006. p. 581-90.
    • Dhamija R, Tygar JD, Hearst M. Why phishing works. In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal, Quebec, Canada; 2006. p. 581-90.
  • 6
    • 57849166508 scopus 로고    scopus 로고
    • Dierks T, Rescorla E. The transport layer security {(TLS)} protocol version 1.1, internet request for comment (RFC) number 4346; April 2006.
    • Dierks T, Rescorla E. The transport layer security {(TLS)} protocol version 1.1, internet request for comment (RFC) number 4346; April 2006.
  • 7
    • 57849161194 scopus 로고    scopus 로고
    • Eastlake J, Reagle J, Solo D. XML-signature syntax and processing, RFC 3275. Also a W3C Recommendation available at: http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/; March 2002.
    • Eastlake J, Reagle J, Solo D. XML-signature syntax and processing, RFC 3275. Also a W3C Recommendation available at: http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/; March 2002.
  • 8
    • 57849094218 scopus 로고    scopus 로고
    • Franco R. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers, published in Microsoft Developer Network's IEBlog, Available from: ; November 21, 2005.
    • Franco R. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers, published in Microsoft Developer Network's IEBlog, Available from: ; November 21, 2005.
  • 9
    • 57849160416 scopus 로고    scopus 로고
    • Felten EW, Balfanz D, Dean D, Wallach DS. Web Spoofing: An Internet Con Game. Proceedings of the Twentieth National Information Systems Security Conference, Baltimore. Also Technical Report 540-96, Department of Computer Science, Princeton University; October 1997.
    • Felten EW, Balfanz D, Dean D, Wallach DS. Web Spoofing: An Internet Con Game. Proceedings of the Twentieth National Information Systems Security Conference, Baltimore. Also Technical Report 540-96, Department of Computer Science, Princeton University; October 1997.
  • 10
    • 33749063674 scopus 로고    scopus 로고
    • Gabrilovich E, Gontmakher A. The homograph attack. Communications of the ACM, 2002;45(2).
    • Gabrilovich E, Gontmakher A. The homograph attack. Communications of the ACM, 2002;45(2).
  • 11
    • 57849088422 scopus 로고    scopus 로고
    • Gasparini LA, Gotlieb CE. Method and apparatus for authentication of users and web sites, US patent number 7100049, filing date: May 9, 2003, issue date: Aug 29, 2006.
    • Gasparini LA, Gotlieb CE. Method and apparatus for authentication of users and web sites, US patent number 7100049, filing date: May 9, 2003, issue date: Aug 29, 2006.
  • 12
    • 54049142548 scopus 로고    scopus 로고
    • Herzberg A, Jbara A. Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks, ACM Transactions on Internet Technology (TIOT), Sept. 2008. Earlier version: Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites published as DIMACS Technical Report 2004-23, May 2004.
    • Herzberg A, Jbara A. Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks, ACM Transactions on Internet Technology (TIOT), Sept. 2008. Earlier version: Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites published as DIMACS Technical Report 2004-23, May 2004.
  • 13
    • 57849093316 scopus 로고    scopus 로고
    • Jackson C, Simon D, Tan D, Barth A. An evaluation of extended validation and picture-in-picture phishing attacks. In: Usable security (USEC'07). Available from: ; 2007.
    • Jackson C, Simon D, Tan D, Barth A. An evaluation of extended validation and picture-in-picture phishing attacks. In: Usable security (USEC'07). Available from: ; 2007.
  • 15
    • 84863469085 scopus 로고    scopus 로고
    • Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC. Stronger password authentication using browser extensions. In: Proceedings of the 14th conference on USENIX Security Symposium, July 31-August 05, 2005, Baltimore, MD; 2005. p. 2-2.
    • Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC. Stronger password authentication using browser extensions. In: Proceedings of the 14th conference on USENIX Security Symposium, July 31-August 05, 2005, Baltimore, MD; 2005. p. 2-2.
  • 17
    • 34548786769 scopus 로고    scopus 로고
    • Schechter S, Dhamija E, Ozment A, Fischer I. The emperor's new security indicators. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 51-65, May 2007.
    • Schechter S, Dhamija E, Ozment A, Fischer I. The emperor's new security indicators. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 51-65, May 2007.
  • 18
    • 85084161247 scopus 로고    scopus 로고
    • Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.
    • Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.
  • 19
    • 33745867321 scopus 로고    scopus 로고
    • Wu M, Miller RC, Garfinkel SL. Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal, Quebec, Canada; 2006. p. 601-10.
    • Wu M, Miller RC, Garfinkel SL. Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI conference on human factors in computing systems, Montreal, Quebec, Canada; 2006. p. 601-10.
  • 20
    • 57849157599 scopus 로고    scopus 로고
    • Ye Z, Yuan Y, Smith S. Web Spoofing Revisited: SSL and Beyond. Tech. Rep. Department of Computer Science, Dartmouth College, TR2002-417; 2002.
    • Ye Z, Yuan Y, Smith S. Web Spoofing Revisited: SSL and Beyond. Tech. Rep. Department of Computer Science, Dartmouth College, TR2002-417; 2002.
  • 22
    • 34250747969 scopus 로고    scopus 로고
    • Yee KP, Sitaker K. Passpet: convenient password management and phishing protection. In: Proceedings of the second symposium on usable privacy and security; 2006. p. 32-43.
    • Yee KP, Sitaker K. Passpet: convenient password management and phishing protection. In: Proceedings of the second symposium on usable privacy and security; 2006. p. 32-43.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.