메뉴 건너뛰기




Volumn , Issue , 2013, Pages 333-340

All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design

Author keywords

Cloud; Password manager; Phishing; Security; Web browser

Indexed keywords

BUILT-IN FEATURE; PASSWORD MANAGERS; PHISHING; RATIONAL DESIGN; SECURITY; SECURITY ANALYSIS; SECURITY VULNERABILITIES; STRONG PASSWORD;

EID: 84874835434     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2435349.2435397     Document Type: Conference Paper
Times cited : (27)

References (41)
  • 1
    • 84874867626 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES)
    • Advanced Encryption Standard (AES). In NIST FIPS 197, 2001.
    • (2001) NIST FIPS , vol.197
  • 2
    • 84874834080 scopus 로고    scopus 로고
    • The CCM mode for authentication and confidentiality
    • The CCM Mode for Authentication and Confidentiality. In NIST SP 800-38C, 2004.
    • (2004) NIST SP 800-38C
  • 5
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40-46, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 6
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D.V.2
  • 7
    • 84878353718 scopus 로고    scopus 로고
    • The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
    • J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proc. of IEEE S&P, 2012.
    • (2012) Proc. of IEEE S&P
    • Bonneau, J.1    Herley, C.2    Van Oorschot, P.C.3    Stajano, F.4
  • 8
    • 74049144464 scopus 로고    scopus 로고
    • Hail: A high-availability and integrity layer for cloud storage
    • K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proc. of CCS, 2009.
    • (2009) Proc. of CCS
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 9
    • 85071440512 scopus 로고    scopus 로고
    • Halting password puzzles: Hard-to-break encryption from human-memorable keys
    • X. Boyen. Halting password puzzles: hard-to-break encryption from human-memorable keys. In Proc. of USENIX Security Symposium, 2007.
    • (2007) Proc. of USENIX Security Symposium
    • Boyen, X.1
  • 13
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • D. Florêncio and C. Herley. A large-scale study of web password habits. In Proc. of WWW, 2007.
    • (2007) Proc. of WWW
    • Florêncio, D.1    Herley, C.2
  • 16
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley and P. C. van Oorschot. A research agenda acknowledging the persistence of passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
    • (2012) IEEE Security & Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.C.2
  • 17
    • 78650145009 scopus 로고    scopus 로고
    • Passwords: If we're so smart, why are we still using them?
    • C. Herley, P. C. van Oorschot, and A. S. Patrick. Passwords: If we're so smart, why are we still using them? In Proc. of FC, 2009.
    • (2009) Proc. of FC
    • Herley, C.1    Van Oorschot, P.C.2    Patrick, A.S.3
  • 18
    • 39049086327 scopus 로고    scopus 로고
    • Back to the future: A framework for automatic malware removal and system repair
    • F. Hsu, H. Chen, T. Ristenpart, J. Li, and Z. Su. Back to the future: A framework for automatic malware removal and system repair. In Proc. of ACSAC, 2006.
    • (2006) Proc. of ACSAC
    • Hsu, F.1    Chen, H.2    Ristenpart, T.3    Li, J.4    Su, Z.5
  • 23
    • 0033719386 scopus 로고    scopus 로고
    • Risks of the passport single signon protocol
    • D. P. Kormann and A. D. Rubin. Risks of the passport single signon protocol. Comput. Networks, 33(1-6):51-58, 2000.
    • (2000) Comput. Networks , vol.33 , Issue.1-6 , pp. 51-58
    • Kormann, D.P.1    Rubin, A.D.2
  • 24
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thompson. Password security: a case history. Commun. ACM, 22(11):594-597, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 31
    • 78751558943 scopus 로고    scopus 로고
    • A billion keys, but few locks: The crisis of web single sign-on
    • S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov. A billion keys, but few locks: the crisis of web single sign-on. In Proc. of NSPW, pages 61-72, 2010.
    • (2010) Proc. of NSPW , pp. 61-72
    • Sun, S.-T.1    Boshmaf, Y.2    Hawkey, K.3    Beznosov, K.4
  • 32
  • 33
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS, 2006.
    • (2006) Proc. of NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.T.7
  • 34
    • 34250786200 scopus 로고    scopus 로고
    • Web wallet: Preventing phishing attacks by revealing user intentions
    • M. Wu, R. C. Miller, and G. Little. Web wallet: preventing phishing attacks by revealing user intentions. In Proc. of SOUPS, pages 102-113, 2006.
    • (2006) Proc. of SOUPS , pp. 102-113
    • Wu, M.1    Miller, R.C.2    Little, G.3
  • 35
    • 85180527787 scopus 로고    scopus 로고
    • The secure remote password protocol
    • T. Wu. The secure remote password protocol. In Proc. of NDSS, 1998.
    • (1998) Proc. of NDSS
    • Wu, T.1
  • 37
    • 0242708748 scopus 로고    scopus 로고
    • A note on proactive password checking
    • J. J. Yan. A note on proactive password checking. In Proc. of NSPW, pages 127-135, 2001.
    • (2001) Proc. of NSPW , pp. 127-135
    • Yan, J.J.1
  • 38
    • 34250747969 scopus 로고    scopus 로고
    • Passpet: Convenient password management and phishing protection
    • K.-P. Yee and K. Sitaker. Passpet: convenient password management and phishing protection. In Proc. of SOUPS, pages 32-43, 2006.
    • (2006) Proc. of SOUPS , pp. 32-43
    • Yee, K.-P.1    Sitaker, K.2
  • 39
    • 84874835343 scopus 로고    scopus 로고
    • Preventing the revealing of online passwords to inappropriate websites with LoginInspector
    • C. Yue. Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector. In Proc. of USENIX LISA, 2012.
    • (2012) Proc. of USENIX LISA
    • Yue, C.1
  • 40
    • 77953587426 scopus 로고    scopus 로고
    • BogusBiter: A transparent protection against phishing attacks
    • C. Yue and H. Wang. BogusBiter: A Transparent Protection Against Phishing Attacks. ACM Transactions on Internet Technology, 10(2):1-31, 2010.
    • (2010) ACM Transactions on Internet Technology , vol.10 , Issue.2 , pp. 1-31
    • Yue, C.1    Wang, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.