메뉴 건너뛰기




Volumn 4, Issue 1, 2012, Pages 29-39

Man in the Browser attacks

Author keywords

Hacking; Internet banking; Man in the browser; Man in the middle; Security

Indexed keywords

AUTHENTICATION DATA; CONTROL STRUCTURE; DATA INTERACTIONS; INTERNET BANKING; INTERNET ENVIRONMENT; LEGITIMATE USERS; MAN IN THE MIDDLE ATTACKS; MAN IN THE MIDDLES (MITM); MAN-IN-THE-BROWSER; SECURITY; SECURITY COMMUNITY;

EID: 84869023231     PISSN: 19416237     EISSN: 19416245     Source Type: Journal    
DOI: 10.4018/jaci.2012010103     Document Type: Article
Times cited : (49)

References (16)
  • 1
    • 84871138493 scopus 로고    scopus 로고
    • Retrieved from Arcot Resources - Briefs and White Papers for Online Identity Fraud Protection
    • Arcot. (2010). Protecting Online Customers from Man-in-the-Browser and Man-in-the-Middle Attacks. Retrieved from Arcot Resources - Briefs and White Papers for Online Identity Fraud Protection website: http://www.arcot.com/ resources/docs/Protection-from-MITM-&-MITB-Attacks-White-Paper.pdf
    • (2010) Protecting Online Customers from Man-in-the-Browser and Man-in-the-Middle Attacks
  • 2
    • 84871121204 scopus 로고    scopus 로고
    • September 30 Retrieved April 5, 2011, from M86 Security Labs
    • Chechik, D. (2009, September 30). Malware Analysis - Trojan Banker URLZone/Bebloh. Retrieved April 5, 2011, from M86 Security Labs website: http://labs.m86security.com/2009/09/malware-analysistrojan-banker-urlzonebebloh/
    • (2009) Malware Analysis - Trojan Banker URLZone/Bebloh
    • Chechik, D.1
  • 3
    • 84871147021 scopus 로고    scopus 로고
    • Retrieved April 3, 2011, from Internet Security and Encryption White Papers
    • Entrust. (2010). Defeating Man-in-the-Browser. Retrieved April 3, 2011, from Internet Security and Encryption White Papers website: http://www.entrust. com/resources/download.cfm/24002/
    • (2010) Defeating Man-in-the-Browser
  • 4
    • 84871140914 scopus 로고    scopus 로고
    • Retrieved from Security Response Whitepapers Symantec Corp.
    • Falliere, N., & Chien, E. (2009). Zeus: King of the Bots. Retrieved from Security Response Whitepapers Symantec Corp. website: http://www.symantec. com/content/en/us/enterprise/media/security-response/whitepapers/ zeus-king-of-bots.pdf
    • (2009) Zeus: King of the Bots
    • Falliere, N.1    Chien, E.2
  • 5
    • 84871140906 scopus 로고    scopus 로고
    • July Retrieved March 20, 2011, from M86 Security
    • Finjan. (2009, July). Cybercrime Intelligence Report, Issue no. 3. Retrieved March 20, 2011, from M86 Security website: http://www.finjan.com/ GetObject.aspx?ObjId=679
    • (2009) Cybercrime Intelligence Report, Issue No. 3
  • 6
    • 48249138794 scopus 로고    scopus 로고
    • September 12 Retrieved March 3, 2011 CAcert.org
    • Gühring, P. (2006, September 12). Concepts against Man-in-the-Browser Attacks. Retrieved March 3, 2011, from CAcert.org website: http://www2.futureware.at/svn/sourcerer/CAcert/SecureClient.pdf
    • (2006) Concepts Against Man-in-the-Browser Attacks
    • Gühring, P.1
  • 7
    • 80052624238 scopus 로고    scopus 로고
    • March 23 Retrieved March 25, 2011 Comodo Blogs
    • Hallam-Baker, P. (2011, March 23). The Recent RA Compromise. Retrieved March 25, 2011, from Comodo Blogs website: http://blogs.comodo.com/it-security/ data-security/the-recent-ra-compromise/
    • (2011) The Recent RA Compromise
    • Hallam-Baker, P.1
  • 8
    • 84871138492 scopus 로고    scopus 로고
    • November 16 Retrieved from Continuity Central
    • Imperva. (2010, November 16). Top ten security trends for2011. Retrieved from Continuity Central website: http://www.continuitycentral.com/feature0830. html
    • (2010) Top Ten Security Trends For2011
  • 9
    • 84871157781 scopus 로고    scopus 로고
    • September 12 Retrieved April 10, 2011 Tricipher
    • Litan, A., & Allan, A. (2006, September 12). Threats: Man in the Browser. Retrieved April 10, 2011, from Tricipher website: http://www.tricipher. com/threats/man-in-the-browser.html
    • (2006) Threats: Man in the Browser
    • Litan, A.1    Allan, A.2
  • 10
    • 74049148313 scopus 로고    scopus 로고
    • July 22 Retrieved April 2011, from SecureTweets Blog website
    • MCRC. (2009, July 22). How a cybergang operates a network of 1.9 million infected computers. Retrieved April 2011, from SecureTweets Blog website: http://www.finjan.com/SecureTweets/Blog/post/How-a-cybergang-operates-a-network- of-19-million-infected-computers.aspx
    • (2009) How a Cybergang Operates a Network of 1.9 Million Infected Computers
  • 11
    • 84871131980 scopus 로고    scopus 로고
    • January 8 Retrieved April 3, 2011 Symantec Security Response
    • Murchu, L. O. (2008, January 8). Trojan. Silentbanker Technical Details. Retrieved April 3, 2011, from Symantec Security Response website: http://www.symantec.com/security-response/writeup.jsp?docid=2007-121718-1009- 99&tabid=2
    • (2008) Trojan. Silentbanker Technical Details
    • Murchu, L.O.1
  • 12
    • 84871125352 scopus 로고    scopus 로고
    • February 19 Retrieved April 9, 2011 threatpost: Kaspersky Lab Security News Service
    • Mushaq, A. (2010, February 19). Man in the Browser: Inside the Zeus Trojan. Retrieved April 9, 2011, from threatpost: Kaspersky Lab Security News Service website: http://threatpost.com/en-us/blogs/manbrowser-inside-zeus- trojan-021910
    • (2010) Man in the Browser: Inside the Zeus Trojan
    • Mushaq, A.1
  • 13
    • 84871168522 scopus 로고    scopus 로고
    • October 31 Retrieved March 15, 2011, from Speaking of Security - The RSA Blog and Podcast website
    • RSA Fraud Action Research Labs. (2008, October 31). One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts. Retrieved March 15, 2011, from Speaking of Security - The RSA Blog and Podcast website: http://blogs.rsa.com/rsafarl/one-sinowal-trojan-one-gang-hundreds-of-thousands- of-compromised-accounts/
    • (2008) One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts
  • 15
    • 84871140914 scopus 로고    scopus 로고
    • Retrieved April 5, 2011, from Security Response Whitepapers Symantec Corp. website
    • Symantec. (2009). Zeus: King of the Bots. Retrieved April 5, 2011, from Security Response Whitepapers Symantec Corp. website: http://www.symantec.com/ content/en/us/enterprise/media/security-response/whitepapers/zeus-king-of-bots. pdf
    • (2009) Zeus: King of the Bots


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.