메뉴 건너뛰기




Volumn , Issue , 2009, Pages 347-359

Pretty-bad-proxy: An overlooked adversary in browsers' HTTPS deployments

Author keywords

Browser security; HTTPS deployment; Pretty bad proxy

Indexed keywords

ATTACK SCENARIOS; BROWSER SECURITY; CRYPTOGRAPHIC SCHEMES; END-TO-END SECURITY; INSECURE NETWORKS; NETWORK ENVIRONMENTS; SENSITIVE DATAS; WEB COMMUNICATIONS;

EID: 70449625210     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.12     Document Type: Conference Paper
Times cited : (20)

References (24)
  • 4
    • 77952394606 scopus 로고    scopus 로고
    • An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
    • Alexandria, VA, Oct-Nov.
    • Shuo Chen, David Ross, Yi-Min Wang, "An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism, " in ACM Conference on Computer and Communications Security, Alexandria, VA, Oct-Nov 2007.
    • (2007) ACM Conference on Computer and Communications Security
    • Chen, S.1    Ross, D.2    Wang, Y.-M.3
  • 5
    • 70449693343 scopus 로고    scopus 로고
    • Cookie Property
    • Cookie Property. MSDN. http://msdn2.microsoft.com/enus/library/ms533693. aspx.
    • MSDN
  • 9
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • Baltimore, Maryland, August
    • Benjamin Livshits and Monica S. Lam. "Finding Security Vulnerabilities in Java Applications with Static Analysis, " in Proc. Usenix Security Symposium, Baltimore, Maryland, August 2005.
    • (2005) Proc. Usenix Security Symposium
    • Livshits, B.1    Lam., M.S.2
  • 14
    • 34548786769 scopus 로고    scopus 로고
    • The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies
    • Oakland, CA. May 20-23
    • Stuart E. Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer, "The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies, " in 2007 IEEE Symposium on Security and Privacy, Oakland, CA. May 20-23, 2007.
    • (2007) 2007 IEEE Symposium on Security and Privacy
    • Schechter, S.E.1    Dhamija, R.2    Ozment, A.3    Fischer, I.4
  • 19
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Vancouver, BC, Canada, July
    • Wei Xu, Sandeep Bhatkar and R. Sekar. "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks, " in Proc. the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 2006.
    • (2006) Proc. the 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 21
    • 70449667170 scopus 로고    scopus 로고
    • MSDN Online. WinHTTP AutoProxy Support. http://msdn.microsoft.com/en-us/ library/aa384240.aspx.
    • WinHTTP AutoProxy Support
  • 22
    • 70449691758 scopus 로고    scopus 로고
    • http://www.hw.ac.uk/uics/Help-FAQs/WiFi-FAQs.html http://homepage.eircom. net/~acsi/encs08.htm http://www.ucd.ie/mcri/resources/IP-logistics-students.pdf http://www.vistagate.com/Demo/Administration/Help.htm http://www.grh.org/ patWireless.html
    • Internet access configuration instructions for some conferences, hotels, hospitals and airports that require proxies. http://homepage.eircom.net/~acsi/ encs08.htm http://www.hw.ac.uk/uics/Help-FAQs/WiFi-FAQs.html http://homepage.eircom.net/~acsi/encs08.htm http://www.ucd.ie/mcri/resources/IP- logistics-students.pdf http://www.vistagate.com/Demo/Administration/Help.htm http://www.grh.org/patWireless.html.
    • Internet Access Configuration Instructions for Some Conferences, Hotels, Hospitals and Airports that Require Proxies
  • 23
    • 70449664557 scopus 로고    scopus 로고
    • http://www.lib.berkeley.edu/Help/proxy-setup-ie5-7-dialup.html http://meded.ucsd.edu/edcom/tech-support/remote-access/web-prox y/internet-explorer/http://physics.ucsd.edu/~sps/html/resources/articles/ sciamsetup.html http://www.lib.ucdavis.edu/ul/services/connect/proxy/step1/ iewindo wslong.php
    • Internet access configuration instructions for some university departments and libraries that require proxies. http://groups.haas.berkeley.edu/ hcs/howdoi/AirBearsXP.pdf http://www.lib.berkeley.edu/Help/proxy-setup-ie5-7- dialup.html http://meded.ucsd.edu/edcom/tech-support/remote-access/web-prox y/internet-explorer/http://physics.ucsd.edu/~sps/html/resources/articles/ sciamsetup.html http://www.lib.ucdavis.edu/ul/services/connect/proxy/step1/ iewindo wslong.php.
    • Internet Access Configuration Instructions for Some University Departments and Libraries that Require Proxies


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.