메뉴 건너뛰기




Volumn , Issue , 2008, Pages 345-354

Anti-phishing in offense and defense

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-PHISHING; DETECTION TECHNIQUES; FIREFOX; HUMAN USERS; INTERNET USERS; NEW APPROACHES; PHISHING; PHISHING ATTACKS; USABILITY STUDIES; WEB SITES;

EID: 60649094724     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.32     Document Type: Conference Paper
Times cited : (31)

References (41)
  • 1
    • 51849153945 scopus 로고    scopus 로고
    • BeamAuth: Two-factor web authentication with a bookmark
    • B. Adida. BeamAuth: Two-factor web authentication with a bookmark. In Proceedings of the CCS, pages 48-57, 2007.
    • (2007) Proceedings of the CCS , pp. 48-57
    • Adida, B.1
  • 2
    • 60649118511 scopus 로고    scopus 로고
    • Phishing phishers - tracing identity thieves and money launderer
    • Technical Report, Horst-Görtz Institute of Ruhr-University of Bochum
    • D. Birk, M. Dornseif, S. Gajek, and F. Gröbert. Phishing phishers - tracing identity thieves and money launderer. Technical Report, Horst-Görtz Institute of Ruhr-University of Bochum, 2006.
    • (2006)
    • Birk, D.1    Dornseif, M.2    Gajek, S.3    Gröbert, F.4
  • 3
    • 35348884907 scopus 로고    scopus 로고
    • Exposing private information by timing web applications
    • A. Bortz, D. Boneh, and P. Nandy. Exposing private information by timing web applications. In Proceedings of the WWW, pages 621-628, 2007.
    • (2007) , pp. 621-628
    • Bortz, A.1    Boneh, D.2    Nandy, P.3
  • 5
    • 77953804362 scopus 로고    scopus 로고
    • The battle against phishing: Dynamic security skins
    • R. Dhamija and J.D. Tygar. The battle against phishing: Dynamic security skins. In Proceedings of the SOUPS, pages 77-88, 2005.
    • (2005) Proceedings of the SOUPS , pp. 77-88
    • Dhamija, R.1    Tygar, J.D.2
  • 7
    • 57649166927 scopus 로고    scopus 로고
    • You've been warned: An empirical study of the effectiveness of web browser phishing warnings
    • S. Egelman, L. F. Cranor, and J. Hong. You've been warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the CHI, pages 1065-1074, 2008.
    • (2008) Proceedings of the CHI , pp. 1065-1074
    • Egelman, S.1    Cranor, L.F.2    Hong, J.3
  • 9
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • D. Florêncio and C. Herley. A large-scale study of web password habits. In Proceedings of the WWW, pages 657-666, 2007.
    • (2007) , pp. 657-666
    • Florêncio, D.1    Herley, C.2
  • 14
    • 34249852316 scopus 로고    scopus 로고
    • Designing ethical phishing experiments: A study of (ROT13) rOnl query features
    • M. Jakobsson and J. Ratkiewicz. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In Proceedings of the WWW, pages 513-522, 2006.
    • (2006) , pp. 513-522
    • Jakobsson, M.1    Ratkiewicz, J.2
  • 16
    • 35348906237 scopus 로고    scopus 로고
    • Protecting people from phishing: The design and evaluation of an embedded training email system
    • P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong, and E. Nung. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the CHI, pages 905-914, 2007.
    • (2007) Proceedings of the CHI , pp. 905-914
    • Kumaraguru, P.1    Rhee, Y.2    Acquisti, A.3    Cranor, L.F.4    Hong, J.5    Nung, E.6
  • 20
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • B. Pinkas and T. Sander. Securing passwords against dictionary attacks. In Proceedings of the CCS, pages 161-170, 2002.
    • (2002) Proceedings of the CCS , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 21
    • 33745816410 scopus 로고    scopus 로고
    • Rachna Dhamija and J.D. Tygar and Marti Hearst. Why phishing works. In Proceedings of the CHI, pages 581-590, 2006.
    • Rachna Dhamija and J.D. Tygar and Marti Hearst. Why phishing works. In Proceedings of the CHI, pages 581-590, 2006.
  • 23
    • 34548786769 scopus 로고    scopus 로고
    • The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy, pages 51-65, 2007.
    • (2007) Proceedings of the IEEE Symposium on Security and Privacy , pp. 51-65
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 28
    • 33745867321 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In Proceedings of the CHI, pages 601-610, 2006.
    • (2006) Proceedings of the CHI , pp. 601-610
    • Wu, M.1    Miller, R.C.2    Garfinkel, S.L.3
  • 29
    • 34250786200 scopus 로고    scopus 로고
    • Web Wallet: Preventing phishing attacks by revealing user intentions
    • M. Wu, R. C. Miller, and G. Little. Web Wallet: preventing phishing attacks by revealing user intentions. In Proceedings of the SOUPS, pages 102-113, 2006.
    • (2006) Proceedings of the SOUPS , pp. 102-113
    • Wu, M.1    Miller, R.C.2    Little, G.3
  • 31
    • 34250747969 scopus 로고    scopus 로고
    • Passpet: Convenient password management and phishing protection
    • K.-P. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In Proceedings of the SOUPS, pages 32-43, 2006.
    • (2006) Proceedings of the SOUPS , pp. 32-43
    • Yee, K.-P.1    Sitaker, K.2
  • 33
    • 35348905575 scopus 로고    scopus 로고
    • CANTINA: A content-based approach to detecting phishing web sites
    • Y. Zhang, J. Hong, and L. Cranor. CANTINA: A content-based approach to detecting phishing web sites. In Proceedings of the WWW, pages 639-648, 2007.
    • (2007) , pp. 639-648
    • Zhang, Y.1    Hong, J.2    Cranor, L.3
  • 41
    • 84868897722 scopus 로고    scopus 로고
    • PhishTank. http://www.phishtank.com/.
    • PhishTank


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.