메뉴 건너뛰기




Volumn 19, Issue 4, 2011, Pages 703-750

Leveraging personal devices for stronger password authentication from untrusted computers

Author keywords

Password authentication; personal device; phishing; session hijacking; untrusted computers

Indexed keywords

PASSWORD AUTHENTICATION; PERSONAL DEVICES; PHISHING; SESSION HIJACKING; UNTRUSTED COMPUTERS;

EID: 79960801872     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0412     Document Type: Article
Times cited : (24)

References (77)
  • 2
    • 84871201016 scopus 로고    scopus 로고
    • An experimental investigation of the usability of transaction authorization in online bank security systems
    • Wollongong, Australia, January
    • M. AlZomai, B. AlFayyadh, A. Jøsang and A. McCullag, An experimental investigation of the usability of transaction authorization in online bank security systems, in: Australasian Information Security Conference (AISC'08), Wollongong, Australia, January 2008, pp. 65-73.
    • (2008) Australasian Information Security Conference (AISC'08) , pp. 65-73
    • AlZomai, M.1    AlFayyadh, B.2    Jøsang, A.3    McCullag, A.4
  • 3
    • 34548344520 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • Anti-Phishing Working Group, Phishing Activity Trends Report Q4/2009, available at: http://www. antiphishing.org/reports/apwg-report-Q4-2009.pdf.
    • (2009) Phishing Activity Trends Report
  • 6
    • 85084162119 scopus 로고    scopus 로고
    • Hand-held computers can be better smart cards
    • Washington, DC, USA, August
    • D. Balfanz and E. Felten, Hand-held computers can be better smart cards, in: USENIX Security Symposium, Washington, DC, USA, August 1999, pp. 15-24.
    • (1999) USENIX Security Symposium , pp. 15-24
    • Balfanz, D.1    Felten, E.2
  • 7
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, Journal of Cryptology 21(4) (2008), 469-491.
    • (2008) Journal of Cryptology , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 8
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Santa Barbara, CA, USA, August, LNCS, Springer-Verlag
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO'93, Santa Barbara, CA, USA, August 1993, LNCS, Vol. 773, Springer-Verlag, 1993, pp. 232-249.
    • (1993) Advances in Cryptology - CRYPTO'93 , vol.773 , Issue.1993 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 35048898743 scopus 로고    scopus 로고
    • Cryptanalysis of the alleged SecurID hash function
    • Ottawa, Canada, August, LNCS, Springer-Verlag, 2003
    • A. Biryukov, J. Lano and B. Preneel, Cryptanalysis of the alleged SecurID hash function, in: Selected Areas in Cryptography (SAC), Ottawa, Canada, August 2003, LNCS, Vol. 3006, Springer-Verlag, 2003, pp. 130-144.
    • (2003) Selected Areas in Cryptography (SAC) , vol.3006 , pp. 130-144
    • Biryukov, A.1    Lano, J.2    Preneel, B.3
  • 10
    • 79960821157 scopus 로고    scopus 로고
    • CA Virus Information Center February
    • CA Virus Information Center, Win32.Grams.I, February 2005.
    • (2005) Win32.Grams.I
  • 11
    • 80052801173 scopus 로고    scopus 로고
    • A usability study and critique of two password managers
    • Vancouver, Canada, August
    • S. Chiasson, P. van Oorschot and R. Biddle, A usability study and critique of two password managers, in: USENIX Security Symposium, Vancouver, Canada, August 2006, pp. 1-16.
    • (2006) USENIX Security Symposium , pp. 1-16
    • Chiasson, S.1    Van Oorschot, P.2    Biddle, R.3
  • 12
    • 84958955276 scopus 로고    scopus 로고
    • The untrusted computer problem and camera-based authentication
    • Zurich, Switzerland, August, LNCS, Springer-Verlag, 2002
    • D.E. Clarke, B. Gassend, T. Kotwal, M. Burnside, M. van Dijk, S. Devadas and R.L. Rivest, The untrusted computer problem and camera-based authentication, in: Pervasive Computing, Zurich, Switzerland, August 2002, LNCS, Vol. 2414, Springer-Verlag, 2002, pp. 114-124.
    • (2002) Pervasive Computing , vol.2414 , pp. 114-124
    • Clarke, D.E.1    Gassend, B.2    Kotwal, T.3    Burnside, M.4    Van Dijk, M.5    Devadas, S.6    Rivest, R.L.7
  • 13
    • 79960804783 scopus 로고    scopus 로고
    • Computerworld.com, News article, April 8
    • Computerworld.com, Malware count blows past 1M mark, News article, April 8, 2008.
    • (2008) Malware count blows past 1M mark
  • 19
    • 79960763088 scopus 로고    scopus 로고
    • Eweek.com, Tax scam preys on refund-hungry public with real gov site, News article, November 30, available at:
    • Eweek.com, Tax scam preys on refund-hungry public with real gov site, News article, November 30, 2005, available at: http://www.eweek.com/article2/0, 1895,1894746,00.asp.
    • (2005)
  • 21
    • 79960772378 scopus 로고    scopus 로고
    • F-Secure, F-Secure trojan information pages: Redbrowser.A, March 2006
    • F-Secure, F-Secure trojan information pages: Redbrowser.A, March 2006.
  • 22
    • 70449332446 scopus 로고    scopus 로고
    • Federal Financial Institutions Examination Council (FFIEC October, available at:
    • Federal Financial Institutions Examination Council (FFIEC), FFIEC guidance: Authentication in an Internet banking environment, October 2005, available at: http://www.fdic.gov/news/news/ financial/2005/fil10305.html.
    • (2005) FFIEC Guidance: Authentication in an Internet Banking Environment
  • 24
    • 79960780767 scopus 로고    scopus 로고
    • Finjan Malicious Code Research Center, Cybercrime intelligence report: Cybercriminals use Trojans & money mules to rob online banking accounts. Online article (issue no. 3, available at:
    • Finjan Malicious Code Research Center, Cybercrime intelligence report: Cybercriminals use Trojans & money mules to rob online banking accounts. Online article (issue no. 3, 2009), available at: http://www.finjan.com/ GetObject.aspx?ObjId=679.
    • (2009)
  • 25
    • 79960808450 scopus 로고    scopus 로고
    • Finjan Malicious Code Research Center, available at:
    • Finjan Malicious Code Research Center, Web security trends Report Q3/2007, available at: http://www.finjan.com/GetObject.aspx?ObjId=506.
    • (2007) Web Security Trends Report Q3
  • 26
    • 0010227321 scopus 로고    scopus 로고
    • Fast encryption and authentication: XCBC encryption and XECB authentication modes
    • Yokohama, Japan, April, LNCS, Springer-Verlag, 2001
    • V.D. Gligor and P. Donescu, Fast encryption and authentication: XCBC encryption and XECB authentication modes, in: Workshop on Fast Software Encryption (FSE'01), Yokohama, Japan, April 2001, LNCS, Vol. 2355, Springer-Verlag, 2001, pp. 1-20.
    • (2001) Workshop on Fast Software Encryption (FSE'01) , vol.2355 , pp. 1-20
    • Gligor, V.D.1    Donescu, P.2
  • 27
    • 79960803091 scopus 로고    scopus 로고
    • January-June, Malicious programs for mobile devices, September 2006, available at:
    • A. Gostev and A. Shevchenko, Kaspersky security bulletin, January-June 2006: Malicious programs for mobile devices, September 2006, available at: http://www.viruslist.com.
    • (2006) Kaspersky Security Bulletin
    • Gostev, A.1    Shevchenko, A.2
  • 31
    • 79960824293 scopus 로고    scopus 로고
    • IDG News Service, News article, May 21, available at:
    • IDG News Service, Investigators replicate Nokia 1100 online banking hack, News article, May 21, 2009, available at: http://www.thestandard.com/news/2009/ 05/21/investigators-replicate-nokia- 1100-online-banking-hack.
    • (2009) Investigators Replicate Nokia 1100 Online Banking Hack
  • 38
    • 77950587694 scopus 로고    scopus 로고
    • Choose the red pill and the blue pill
    • Lake Tahoe, CA, USA, September
    • B. Laurie and A. Singer, Choose the red pill and the blue pill, in: New Security Paradigms Workshop (NSPW'08), Lake Tahoe, CA, USA, September 2008, pp. 127-133.
    • (2008) New Security Paradigms Workshop (NSPW'08) , pp. 127-133
    • Laurie, B.1    Singer, A.2
  • 44
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • J.M. McCune, A. Perrig and M.K. Reiter, Seeing-is-believing: Using camera phones for humanverifiable authentication, in: IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2005, pp. 110-124. (Pubitemid 41543650)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 45
    • 85077302433 scopus 로고    scopus 로고
    • Bump in the Ether: A framework for securing sensitive user input
    • Boston, MA, USA
    • J.M. McCune, A. Perrig and M.K. Reiter, Bump in the Ether: A framework for securing sensitive user input, in: USENIX Annual Technical Conference, Boston, MA, USA, 2006, pp. 185-198.
    • (2006) USENIX Annual Technical Conference , pp. 185-198
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 48
    • 79960789287 scopus 로고    scopus 로고
    • Mobile electronic Transactions (MeT) Ltd., (Draft Specification January available at:
    • Mobile electronic Transactions (MeT) Ltd., Personal Transaction Protocol Version 1.0 (Draft Specification), January 2002, available at: http://www.mobiletransaction.org/.
    • (2002) Personal Transaction Protocol Version 1.0
  • 52
    • 79960769718 scopus 로고    scopus 로고
    • Netcraft.com, More than 450 phishing attacks used SSL in, available at:
    • Netcraft.com, More than 450 phishing attacks used SSL in 2005, available at: http://news. netcraft.com/archives/2005/12/28/more-than-450-phishing- attacks-used-ssl-in-2005. html.
    • (2005)
  • 53
    • 79960803861 scopus 로고    scopus 로고
    • Netcraft.com, Phishers hack bank sites, redirect customers, News article, March 27, available at:
    • Netcraft.com, Phishers hack bank sites, redirect customers, News article, March 27, 2006, available at: http://news.netcraft.com/archives/2006/03/27/ phishers-hack-bank-sites-redirect-customers. html.
    • (2006)
  • 57
    • 3142579333 scopus 로고    scopus 로고
    • Hash visualization: A new technique to improve real-world security
    • Hong Kong, July
    • A. Perrig and D. Song, Hash visualization: A new technique to improve real-world security, in: Cryptographic Techniques and E-Commerce (CrypTEC'99), Hong Kong, July 1999, pp. 131-138.
    • (1999) Cryptographic Techniques and E-Commerce (CrypTEC'99) , pp. 131-138
    • Perrig, A.1    Song, D.2
  • 58
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • Washington, DC, USA, November
    • B. Pinkas and T. Sander, Securing passwords against dictionary attacks, in: ACM Computer and Communications Security (CCS'02), Washington, DC, USA, November 2002, pp. 161-170.
    • (2002) ACM Computer and Communications Security (CCS'02) , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 60
    • 79960779012 scopus 로고    scopus 로고
    • Redmondmag.com, News article, August 7, available at:
    • Redmondmag.com, Coreflood Trojan stole 500G of personal financial data. News article, August 7, 2008, available at: http://redmondmag.com/news/article. asp?editorialsid=10111.
    • (2008) Coreflood Trojan stole 500G of personal financial data
  • 64
    • 77950964619 scopus 로고    scopus 로고
    • November, Symbian Developer Network article, available at:
    • M. Shackman, Platform security - a technical overview, November 2006, Symbian Developer Network article, available at: http://developer.symbian.com/ main/downloads/papers/plat-sec-tech-overview/platform-security-a-technical- overview.pdf.
    • (2006) Platform Security - A Technical Overview
    • Shackman, M.1
  • 65
    • 79960810681 scopus 로고    scopus 로고
    • SpamFo.co.uk, Has MasterCard gone on a phishing trip, leaving the back door wide open, News article, July 19, available at:
    • SpamFo.co.uk, Has MasterCard gone on a phishing trip, leaving the back door wide open, News article, July 19, 2004, available at: http://spamfo.co.uk/ 2004/07.
    • (2004)
  • 66
    • 79960798489 scopus 로고    scopus 로고
    • Symantec Security Response Banking in silence, News article, January 14, available at:
    • Symantec Security Response, Banking in silence, News article, January 14, 2008, available at: http://www.securityfocus.com/blogs/485.
    • (2008)
  • 67
    • 79960823842 scopus 로고    scopus 로고
    • The Sydney Morning Herald, NZ bank adds security online, News article, November 8, available at:
    • The Sydney Morning Herald, NZ bank adds security online, News article, November 8, 2004, available at: http://www.smh.com.au/.
    • (2004)
  • 68
    • 79960830392 scopus 로고    scopus 로고
    • TheRegister.com, Phishing attack targets one-time passwords, News article, October 12, available at:
    • TheRegister.com, Phishing attack targets one-time passwords, News article, October 12, 2005, available at: http://www.theregister.co.uk/2005/10/ 12/outlaw-phishing/.
    • (2005)
  • 69
    • 38549108892 scopus 로고    scopus 로고
    • Usability analysis of secure pairing methods
    • Lowlands, Scarborough, Trinidad and Tobago, February, LNCS, Springer-Verlag, 2007
    • E. Uzun, K. Karvonen and N. Asokan, Usability analysis of secure pairing methods, in:Workshop on Usable Security (USEC'07), Lowlands, Scarborough, Trinidad and Tobago, February 2007, LNCS, Vol. 4886, Springer-Verlag, 2007, pp. 307-327.
    • (2007) Workshop on Usable Security (USEC'07) , vol.4886 , pp. 307-327
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 70
    • 33745603791 scopus 로고    scopus 로고
    • Message authentication by integrity with public corroboration
    • Lake Arrowhead, CA, USA, September
    • P. van Oorschot, Message authentication by integrity with public corroboration, in: New Security Paradigms Workshop (NSPW'05), Lake Arrowhead, CA, USA, September 2005, pp. 57-63.
    • (2005) New Security Paradigms Workshop (NSPW'05) , pp. 57-63
    • Van Oorschot, P.1
  • 71
    • 33750906057 scopus 로고    scopus 로고
    • On countering online dictionary attacks with login histories and humans-in-the-loop
    • DOI 10.1145/1178618.1178619
    • P. van Oorschot and S. Stubblebine, On countering online dictionary attacks with login histories and humans-in-the-loop, ACM Transactions on Information and System Security (TISSEC) 9(3) (2006), 235-258. (Pubitemid 44728674)
    • (2006) ACM Transactions on Information and System Security , vol.9 , Issue.3 , pp. 235-258
    • Van Oorschot, P.C.1    Stubblebine, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.