-
1
-
-
74049108810
-
-
Paros website. http://www.parosproxy.org.
-
Paros website
-
-
-
2
-
-
74049151306
-
-
ID theft ring hits 50 banks, security firm says, 2005. http: //news.cnet.com/2100-7349-3-5823591.html.
-
ID theft ring hits 50 banks, security firm says, 2005. http: //news.cnet.com/2100-7349-3-5823591.html.
-
-
-
-
3
-
-
74049123710
-
-
New Trojans plunder bank accounts, 2006. http: //news.cnet.com/2100-7349- 3-6041173.html.
-
New Trojans plunder bank accounts, 2006. http: //news.cnet.com/2100-7349- 3-6041173.html.
-
-
-
-
4
-
-
74049092910
-
-
AMD. AMD64 architecture programmer's manual 2: System programming. Technical Report Publication Number 24593, Revision 3.14, AMD, Sept. 2007.
-
AMD. AMD64 architecture programmer's manual volume 2: System programming. Technical Report Publication Number 24593, Revision 3.14, AMD, Sept. 2007.
-
-
-
-
5
-
-
34548344520
-
-
Anti Phishing Working Group
-
Anti Phishing Working Group. Phishing Activity Trends Report(s), 2005-2008. http://www.antiphishing.org.
-
(2005)
Phishing Activity Trends Report(s)
-
-
-
6
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May, IEEE Computer Society
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In IEEE Symposium on Security and Privacy (S&P'97), pages 65-71, Oakland, CA, May 1997. IEEE Computer Society.
-
(1997)
IEEE Symposium on Security and Privacy (S&P'97)
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
7
-
-
70349233792
-
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
-
Hilton Alexandria Mark Center, Virginia, USA, ACM
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. T. Abad. Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In 6th ACM Workshop on Formal Methods in Security Engineering (FMSE'08), pages 1-10, Hilton Alexandria Mark Center, Virginia, USA, 2008. ACM.
-
(2008)
6th ACM Workshop on Formal Methods in Security Engineering (FMSE'08)
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Abad, L.T.5
-
8
-
-
38149014725
-
Enabling fairer digital rights management with trusted computing
-
10th Information Security Conference ISC'07, Springer
-
N. Asokan, J.-E. Ekberg, A.-R. Sadeghi, C. Stüble, and M. Wolf. Enabling fairer digital rights management with trusted computing. In 10th Information Security Conference (ISC'07), LNCS vol. 4779, pages 53-70. Springer, 2007.
-
(2007)
LNCS
, vol.4779
, pp. 53-70
-
-
Asokan, N.1
Ekberg, J.-E.2
Sadeghi, A.-R.3
Stüble, C.4
Wolf, M.5
-
9
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security and Privacy (S&P'92), pages 72-84, 1992.
-
(1992)
IEEE Symposium on Security and Privacy (S&P'92)
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
10
-
-
33751067472
-
A safety-oriented platform for web applications
-
IEEE Computer Society
-
R. S. Cox, J. G. Hansen, S. D. Gribble, and H. M. Levy. A safety-oriented platform for web applications. In IEEE Symposium on Security and Privacy (S&P'06), pages 350-364. IEEE Computer Society, 2006.
-
(2006)
IEEE Symposium on Security and Privacy (S&P'06)
, pp. 350-364
-
-
Cox, R.S.1
Hansen, J.G.2
Gribble, S.D.3
Levy, H.M.4
-
12
-
-
21644433634
-
Xen and the art of virtualization
-
ACM, October
-
B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham, and R. Neugebauer. Xen and the art of virtualization. In ACM Symposium on Operating Systems Principles (SOSP'03), pages 164-177. ACM, October 2003.
-
(2003)
ACM Symposium on Operating Systems Principles (SOSP'03)
, pp. 164-177
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
14
-
-
34548150723
-
Compartmented security for browsers - or how to thwart a phisher with trusted computing
-
IEEE Computer Society
-
S. Gajek, A.-R. Sadeghi, C. Stüble, and M. Winandy. Compartmented security for browsers - or how to thwart a phisher with trusted computing. In 2nd International Conference on Availability, Reliability and Security (ARES'07), pages 120-127. IEEE Computer Society, 2007.
-
(2007)
2nd International Conference on Availability, Reliability and Security (ARES'07)
, pp. 120-127
-
-
Gajek, S.1
Sadeghi, A.-R.2
Stüble, C.3
Winandy, M.4
-
15
-
-
70349233396
-
On the insecurity of microsoft's identity metasystem cardspace
-
TR-2008-004, Horst Görtz Institute for IT-Security, Ruhr-University Bochum
-
S. Gajek, J. Schwenk, and X. Chen. On the insecurity of microsoft's identity metasystem cardspace. Technical Report HGI TR-2008-004, Horst Görtz Institute for IT-Security, Ruhr-University Bochum, 2008.
-
(2008)
Technical Report HGI
-
-
Gajek, S.1
Schwenk, J.2
Chen, X.3
-
16
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
ACM
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In 19th ACM Symposium on Operating Systems Principles (SOSP'03), pages 193-206. ACM, 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles (SOSP'03)
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
19
-
-
50249182906
-
Secure web browsing with the OP web browser
-
Washington, DC, USA, IEEE Computer Society
-
C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In IEEE Symposium on Security and Privacy (S&P'08), pages 402-416, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
IEEE Symposium on Security and Privacy (S&P'08)
, pp. 402-416
-
-
Grier, C.1
Tang, S.2
King, S.T.3
-
21
-
-
70449464048
-
Intel trusted execution technology software development guide
-
Intel Corporation, 315168-005, Intel Corporation, June
-
Intel Corporation. Intel trusted execution technology software development guide. Technical Report Document Number: 315168-005, Intel Corporation, June 2008.
-
(2008)
Technical Report Document Number
-
-
-
22
-
-
70449690094
-
-
Internet Crime Complaint Center
-
Internet Crime Complaint Center. 2008 Internet Crime Report. http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf, 2008.
-
(2008)
Internet Crime Report
, pp. 2008
-
-
-
23
-
-
33751045298
-
Building a secure web browser
-
Berkeley, CA, USA, USENIX Association
-
S. Ioannidis and S. M. Bellovin. Building a secure web browser. In FREENIX Track: 2001 USENIX Annual Technical Conference, pages 127-134, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
FREENIX Track: 2001 USENIX Annual Technical Conference
, pp. 127-134
-
-
Ioannidis, S.1
Bellovin, S.M.2
-
24
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, 26(5):5-26, 1996.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
27
-
-
39049092821
-
Delegate: A proxy based architecture for secure website access from an untrusted machine
-
IEEE Computer Society
-
R. C. Jammalamadaka, T. W. van der Horst, S. Mehrotra, K. E. Seamons, and N. Venkasubramanian. Delegate: A proxy based architecture for secure website access from an untrusted machine. In 22nd Annual Computer Security Applications Conference (ACSAC'06), pages 57-66. IEEE Computer Society, 2006.
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC'06)
, pp. 57-66
-
-
Jammalamadaka, R.C.1
van der Horst, T.W.2
Mehrotra, S.3
Seamons, K.E.4
Venkasubramanian, N.5
-
30
-
-
33751032654
-
Noxes: A client-side solution for mitigating cross-site scripting attacks
-
ACM
-
E. Kirda, C. Krügel, G. Vigna, and N. Jovanovic. Noxes: a client-side solution for mitigating cross-site scripting attacks. In ACM Symposium on Applied Computing (SAC), pages 330-337. ACM, 2006.
-
(2006)
ACM Symposium on Applied Computing (SAC)
, pp. 330-337
-
-
Kirda, E.1
Krügel, C.2
Vigna, G.3
Jovanovic, N.4
-
31
-
-
0033719386
-
Risks of the passport single signon protocol
-
D. Kormann and A. Rubin. Risks of the passport single signon protocol. Computer Networks, 33(1-6):51-58, 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 51-58
-
-
Kormann, D.1
Rubin, A.2
-
32
-
-
74049088382
-
On-board credentials with open provisioning
-
ACM
-
K. Kostiainen, J.-E. Ekberg, N. Asokan, and A. Rantala. On-board credentials with open provisioning. In 4th International Symposium on Information, Computer, and Communications Security (ASIACCS'09), pages 104-115. ACM, 2009.
-
(2009)
4th International Symposium on Information, Computer, and Communications Security (ASIACCS'09)
, pp. 104-115
-
-
Kostiainen, K.1
Ekberg, J.-E.2
Asokan, N.3
Rantala, A.4
-
33
-
-
74049164972
-
The new face of phishing
-
http
-
B. Krebs. The new face of phishing. Washington Post, 2006. http: //blog.washingtonpost.com/securityfix/2006/02/the-new-face-of-phishing-1.html.
-
(2006)
Washington Post
-
-
Krebs, B.1
-
36
-
-
21644481379
-
Bear: An open-source virtual secure coprocessor based on TCPA
-
Technical Report TR2003-471, Department of Computer Science, Dartmouth College
-
R. Macdonald, S. Smith, J. Marchesini, and O. Wild. Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College, 2003.
-
(2003)
-
-
Macdonald, R.1
Smith, S.2
Marchesini, J.3
Wild, O.4
-
37
-
-
34548722186
-
Minimal TCB code execution
-
IEEE Computer Society
-
J. M. McCune, B. Parno, A. Perrig, M. K. Reiter, and A. Seshadri. Minimal TCB code execution. In 2007 IEEE Symposium on Security and Privacy (S&P'07), pages 267-272. IEEE Computer Society, 2007.
-
(2007)
2007 IEEE Symposium on Security and Privacy (S&P'07)
, pp. 267-272
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
38
-
-
49849096978
-
SSL/TLS session-aware user authentication revisited
-
R. Oppliger, R. Hauser, and D. A. Basin. SSL/TLS session-aware user authentication revisited. Computers & Security, 27(3-4):64-70, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.3-4
, pp. 64-70
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.A.3
-
39
-
-
1142301938
-
Analysis of liberty single-sign-on with enabled clients
-
B. Pfitzmann and M. Waidner. Analysis of liberty single-sign-on with enabled clients. IEEE Internet Computing, 7(6):38-44, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 38-44
-
-
Pfitzmann, B.1
Waidner, M.2
-
40
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
Berkeley, CA, USA, USENIX Association
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In First Workshop on Hot Topics in Understanding Botnets (HotBots'07), pages 4-4, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
, pp. 4-4
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
42
-
-
84863469085
-
Stronger password authentication using browser extensions
-
USENIX Association
-
B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In 14th USENIX Security Symposium. USENIX Association, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
43
-
-
33750248123
-
Building a MAC-based security architecture for the Xen open-source hypervisor
-
IEEE Computer Society
-
R. Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen open-source hypervisor. In 21st Annual Computer Security Applications Conference (ACSAC'05), pages 276-285. IEEE Computer Society, 2005.
-
(2005)
21st Annual Computer Security Applications Conference (ACSAC'05)
, pp. 276-285
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Perez, R.4
Berger, S.5
Griffin, J.L.6
van Doorn, L.7
-
44
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
August
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In 13th USENIX Security Symposium, pages 223-238, August 2004.
-
(2004)
13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
45
-
-
84870259303
-
-
SANS Institute, November 2007
-
SANS Institute. SANS Top-20 2007 Security Risks. http://www.sans.org/ top20/2007/top20.pdf, November 2007.
-
SANS Top-20 2007 Security Risks
-
-
-
46
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
April
-
S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31(8):831-860, April 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.2
-
47
-
-
70350698232
-
MD5 considered harmful today - creating a rogue CA certificate
-
December
-
A. Sotirov, M. Stevens, J. Appelbaum, A. Lenstra, D. Molnar, D. A. Osvik, and B. de Weger. MD5 considered harmful today - creating a rogue CA certificate. In 25th Chaos Communication Congress (25C3), December 2008. http://www.win.tue.nl/hashclash/rogue-ca.
-
(2008)
25th Chaos Communication Congress (25C3)
-
-
Sotirov, A.1
Stevens, M.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
de Weger, B.7
-
48
-
-
49049096411
-
A robust integrity reporting protocol for remote attestation
-
Tokyo, December
-
F. Stumpf, O. Tafreschi, P. Rder, and C. Eckert. A robust integrity reporting protocol for remote attestation. In Second Workshop on Advances in Trusted Computing (WATC'06 Fall), Tokyo, December 2006.
-
(2006)
Second Workshop on Advances in Trusted Computing (WATC'06 Fall)
-
-
Stumpf, F.1
Tafreschi, O.2
Rder, P.3
Eckert, C.4
-
50
-
-
77952371831
-
-
Trusted Computing Group, version 1.2 rev, July 2007
-
Trusted Computing Group. TPM main specification, version 1.2 rev. 103, July 2007. https://www.trustedcomputinggroup.org.
-
TPM main specification
, pp. 103
-
-
|