-
2
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
AHN, L., BLUM, M., HOPPER, N., AND LANGFORD, J. 2003. CAPTCHA: Using hard AI problems for security. In Proceedings of Eurocrypt. 294-311.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
3
-
-
77953579556
-
-
APWG
-
APWG. 2008. Anti-Phishing Working Group (APWG). http://www.antiphishing. org/.
-
(2008)
-
-
-
5
-
-
77953564872
-
-
POETTERING, B. 2008. jssha256. http://point-at-infinity.org/jssha256/.
-
(2008)
-
-
Poettering, B.1
-
6
-
-
60649118511
-
Phishing Phishers - Tracing Identity Thieves and Money Launderer
-
BIRK, D., DORNSEIF, M., GAJEK, S., AND GRÖBERT, F. 2006. Phishing phishers - tracing identity thieves and money launderer. Tech. rep. Horst-Görtz Institute of Ruhr-University of Bochum.
-
(2006)
Tech. Rep. Horst-Görtz Institute of Ruhr-University of Bochum
-
-
Birk, D.1
Dornseif, M.2
Gajek, S.3
Gröbert, F.4
-
9
-
-
85044841595
-
Client-side defense against web-based identity theft
-
CHOU, N., LEDESMA, R., TERAGUCHI, Y., AND MITCHELL, J. C. 2004. Client-side defense against web-based identity theft. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
-
(2004)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Mitchell, J.C.4
-
13
-
-
77953547563
-
-
EBANKINGSECURITY. 2008. eBanking Security. http://www.ebankingsecurity. com/ebanking-bad-for-your-bank-balance.pdf.
-
(2008)
EBanking Security
-
-
-
15
-
-
0005785915
-
Web spoofing: An internet con game
-
FELTEN, E. W., BALFANZ, D., DEAN, D., AND WALLACH, D. S. 1997. Web Spoofing: An Internet Con Game. In Proceedings of the 20th National Information Systems Security Conference.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
-
-
Felten, E.W.1
Balfanz, D.2
Dean, D.3
Wallach, D.S.4
-
17
-
-
0003415244
-
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MASINTER, L., LEACH, P., AND BERNERS-LEE, T. 1999. RFC 2616, Hypertext Transfer Protocol - HTTP/1.1.
-
(1999)
RFC 2616, Hypertext Transfer Protocol - HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
18
-
-
77953565876
-
-
FIREFOXPHISHINGPROTECTION. 2008. Firefox Phishing Protection. http://www.mozilla.com/en-US/firefox/phishing-protection/.
-
(2008)
Firefox Phishing Protection
-
-
-
24
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. 2007. A framework for detection and measurement of phishing attacks. In Proceedings of the ACM Workshop On Recuring Malcode (WORM).
-
(2007)
Proceedings of the ACM Workshop on Recuring Malcode (WORM)
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
25
-
-
77953574204
-
-
inc.
-
GARTNERSURVEY. 2006. Gartner, inc., http://www.gartner.com/it/page.jsp? id=498245.
-
(2006)
Gartner
-
-
-
27
-
-
77953606593
-
-
IBM-FAIRUCE
-
IBM-FAIRUCE. 2005. IBM set to use spam to attack spammer. http://money.cnn.com/2005/03/22/technology/ibm-spam/index.htm.
-
(2005)
IBM Set to use Spam to Attack Spammer
-
-
-
28
-
-
77953580896
-
-
INACCESSIBILITYCAPTCHA
-
INACCESSIBILITYCAPTCHA. 2008. Inaccessibility of CAPTCHA. http://www.w3.org/TR/turingtest/.
-
(2008)
Inaccessibility of CAPTCHA
-
-
-
29
-
-
34848911641
-
Social phishing
-
JAGATIC, T. N., JOHNSON, N. A., JAKOBSSON, M., AND MENCZER, F. 2007. Social phishing. Comm. ACM 50, 10, 94-100.
-
(2007)
Comm. ACM 50
, vol.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
33
-
-
84924375780
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds
-
KANDULA, S., KATABI, D., JACOB, M., AND BERGER, A. W. 2005. Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI). 287-300.
-
(2005)
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
35
-
-
0040231044
-
Foiling the cracker - A survey of, and improvements to, password security
-
KLEIN, D. V. 1990. Foiling the cracker - A survey of, and improvements to, password security. In Proceedings of the 2nd USENIX Workshop on Security. 5-14.
-
(1990)
Proceedings of the 2nd USENIX Workshop on Security
, pp. 5-14
-
-
Klein, D.V.1
-
36
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
KUMARAGURU, P., RHEE, Y., ACQUISTI, A., CRANOR, L. F., HONG, J., AND NUNG, E. 2007. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). 905-914.
-
(2007)
Proceedings of the Conference on Human Factors in Computing Systems (CHI)
, pp. 905-914
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nung, E.6
-
37
-
-
77953557877
-
-
KYE-PHISHING
-
KYE-PHISHING. 2008. Know Your Enemy: Phishing. http://www.honeynet.org/ papers/phishing/.
-
(2008)
Know Your Enemy: Phishing
-
-
-
38
-
-
37849049401
-
On the effectiveness of techniques to detect phishing sites
-
LUDL, C., MCALLISTER, S., KIRDA, E., AND KRUEGEL, C. 2007. On the effectiveness of techniques to detect phishing sites. In Proceedings of the International Conference on Detection of Instructions and Malware & Vulnerability Assessment (DIMVA).
-
(2007)
Proceedings of the International Conference on Detection of Instructions and Malware & Vulnerability Assessment (DIMVA)
-
-
Ludl, C.1
Mcallister, S.2
Kirda, E.3
Kruegel, C.4
-
40
-
-
77953555077
-
-
MICROSOFTPHISHINGFILTER. 2008. Microsoft Phishing Filter. http://www.microsoft.com/protect/products/yourself/.
-
(2008)
Microsoft Phishing Filter
-
-
-
43
-
-
0018543411
-
Password security: A case history
-
MORRIS, R. AND THOMPSON, K. 1979. Password security: A case history. Comm. ACM 22, 11, 594-597.
-
(1979)
Comm. ACM 22
, vol.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
44
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
MOSHCHUK, A., BRAGIN, T., DEVILLE, D., GRIBBLE, S. D., AND LEVY, H. M. 2007. Spyproxy: Execution-based detection of malicious web content. In Proceedings of the USENIX Security Symposium. 27-42.
-
(2007)
Proceedings of the USENIX Security Symposium
, pp. 27-42
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
46
-
-
77953551186
-
-
PHISHTANK
-
PHISHTANK. 2008. PhishTank. http://www.phishtank.com/.
-
(2008)
-
-
-
48
-
-
85076780225
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
REIS, C., DUNAGAN, J., WANG, H. J., DUBROVSKY, O., AND ESMEIR, S. 2006. Browsershield: Vulnerability-driven filtering of dynamic html. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 61-74.
-
(2006)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 61-74
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
50
-
-
84863469085
-
Stronger password authentication using browser extensions
-
ROSS, B., JACKSON, C., MIYAKE, N., BONEH, D., AND MITCHELL, J. C. 2005. Stronger password authentication using browser extensions. In Proceedings of the USENIX Security Symposium. 17-32.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 17-32
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
52
-
-
34548786769
-
The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
SCHECHTER, S. E., DHAMIJA, R., OZMENT, A., AND FISCHER, I. 2007. The emperor's new security indicators: An evaluation of Website authentication and the effect of role playing on usability studies. In Proceedings of the IEEE Symposium on Security and Privacy. 51-65.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
53
-
-
36849073159
-
Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
-
SHENG, S., MAGNIEN, B., KUMARAGURU, P., ACQUISTI, A., CRANOR, L. F., HONG, J., AND NUNGE, E. 2007. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). 88-99.
-
(2007)
Proceedings of the Symposium on Usable Privacy and Security (SOUPS)
, pp. 88-99
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
61
-
-
77953606247
-
-
XMLHTTPREQUEST. 2008. http://www.w3.org/TR/XMLHttpRequest/.
-
(2008)
-
-
-
65
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
ZHANG, Y., EGELMAN, S., CRANOR, L. F., AND HONG, J. 2007a. Phinding phish: Evaluating anti-phishing tools. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
-
(2007)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.F.3
Hong, J.4
|