메뉴 건너뛰기




Volumn , Issue , 2006, Pages 31-63

Phishing Attacks: Information Flow and Chokepoints

Author keywords

Chokepoints; Deceptive phishing; Information flow; Pharming; Phishing attacks

Indexed keywords


EID: 84889328778     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470086100.ch2     Document Type: Chapter
Times cited : (7)

References (29)
  • 1
    • 84889343543 scopus 로고    scopus 로고
    • PassMark Security, Inc.
    • PassMark Security, Inc. http://www.passmarksecurity.com.
  • 2
    • 84889447238 scopus 로고    scopus 로고
    • Science and Transportation Hearing on Identity Theft and Data Broker Services
    • Testimony of Kurt Sanford before the US Senate Committee on Commerce, May 10
    • Testimony of Kurt Sanford before the US Senate Committee on Commerce, Science and Transportation Hearing on Identity Theft and Data Broker Services, May 10 2005.
    • (2005)
  • 3
    • 80455175790 scopus 로고    scopus 로고
    • Lightweight signatures for email
    • draft of June 18, to appear
    • B. Adida, D. Chau, S. Hohenberger, and R. L. Rivest. Lightweight signatures for email, draft of June 18, 2005; to appear.
    • (2005)
    • Adida, B.1    Chau, D.2    Hohenberger, S.3    Rivest, R.L.4
  • 5
    • 0038304275 scopus 로고    scopus 로고
    • Advanced SQL injection in SQL Server applications
    • Technical report, NGSSoftware Insight Security Research technical report
    • C. Anley. Advanced SQL injection in SQL Server applications. Technical report, NGSSoftware Insight Security Research technical report, 2002.
    • (2002)
    • Anley, C.1
  • 6
    • 0004304523 scopus 로고    scopus 로고
    • The AuthA protocol for password-based authenticated key exchange
    • Contribution to IEEE PI363.2, March
    • M. Bellare and P. Rogaway. The AuthA protocol for password-based authenticated key exchange. Contribution to IEEE PI363.2, March 2000.
    • (2000)
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84889476694 scopus 로고    scopus 로고
    • Password authenticated diffie-hellman exchange (PAK)
    • Internet Draft, October
    • A. Brusilovsky. Password authenticated diffie-hellman exchange (PAK). Internet Draft, October 2005.
    • (2005)
    • Brusilovsky, A.1
  • 8
    • 33846469356 scopus 로고    scopus 로고
    • Client-side defense against web-based identity theft
    • In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February
    • N. Chou, R. Ledesma, Y. Teraguchi, and J. Mitchell. Client-side defense against web-based identity theft. In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February 2004.
    • (2004)
    • Chou, N.1    Ledesma, R.2    Teraguchi, Y.3    Mitchell, J.4
  • 9
    • 51749091237 scopus 로고    scopus 로고
    • Domain-based email authentication using public-keys advertised in the DNS (Do-mainKeys)
    • Internet Draft, September
    • M. Delany. Domain-based email authentication using public-keys advertised in the DNS (Do-mainKeys). Internet Draft, September 2005.
    • (2005)
    • Delany, M.1
  • 10
    • 84889273679 scopus 로고    scopus 로고
    • Identified internet mail
    • Internet Draft, May
    • J. Fenton and M. Thomas. Identified internet mail. Internet Draft, May 2005.
    • (2005)
    • Fenton, J.1    Thomas, M.2
  • 12
    • 84889340547 scopus 로고    scopus 로고
    • Goodmail. CertifiedEmail service
    • Goodmail. CertifiedEmail service, http://www.goodmailsysteras.com/certifiedmail/.
  • 13
    • 62349096287 scopus 로고    scopus 로고
    • Screen-oriented technique for reducing the incidence of shoulder surfing
    • In Security and Management '05. Las Vegas, June
    • B. Hoanca and K. Mock. Screen-oriented technique for reducing the incidence of shoulder surfing. In Security and Management '05. Las Vegas, June 2005.
    • (2005)
    • Hoanca, B.1    Mock, K.2
  • 14
    • 33746292743 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Submission to IEEE P1363.2, September
    • D. P. Jablon. Strong password-only authenticated key exchange. Submission to IEEE P1363.2, September 1996.
    • (1996)
    • Jablon, D.P.1
  • 15
    • 33845530304 scopus 로고    scopus 로고
    • Distributed phishing attacks
    • Manuscript
    • M. Jakobsson, A. Young, and A. Emigh. Distributed phishing attacks. Manuscript.
    • Jakobsson, M.1    Young, A.2    Emigh, A.3
  • 16
    • 84889276397 scopus 로고    scopus 로고
    • Eliminating spam and enabling email privacy through the use of programmable email addresses
    • Technical report, Titan Key Software technical report, August
    • P. Kay. Eliminating spam and enabling email privacy through the use of programmable email addresses. Technical report, Titan Key Software technical report, August 2004.
    • (2004)
    • Kay, P.1
  • 17
    • 84889425210 scopus 로고    scopus 로고
    • Computers seized in data-theft probe
    • Washington Post, May 19
    • B. Krebs. Computers seized in data-theft probe. Washington Post, May 19 2005.
    • (2005)
    • Krebs, B.1
  • 18
    • 38149126746 scopus 로고    scopus 로고
    • Summary of AMP (authentication and key agreement via memorable passwords)
    • Submission to IEEE 1363.2, August
    • T. Kwon. Summary of AMP (authentication and key agreement via memorable passwords). Submission to IEEE 1363.2, August 2003.
    • (2003)
    • Kwon, T.1
  • 19
    • 38549105180 scopus 로고    scopus 로고
    • Sender ID: Authenticating e-mail
    • Internet Draft, May
    • J. Lyon and M. Wong. Sender ID: Authenticating e-mail. Internet Draft, May 2005.
    • (2005)
    • Lyon, J.1    Wong, M.2
  • 20
    • 0013410282 scopus 로고    scopus 로고
    • Secure network authentication with password identification
    • Submission to IEEE 1363.2, July
    • P. MacKenzie and R. Swaminathan. Secure network authentication with password identification. Submission to IEEE 1363.2, July 1999.
    • (1999)
    • MacKenzie, P.1    Swaminathan, R.2
  • 21
    • 84889359790 scopus 로고    scopus 로고
    • The SecurlD? SASL mechanism
    • IETF RFC 2808, April
    • M. Nystrom. The SecurlD? SASL mechanism. IETF RFC 2808, April 2000.
    • (2000)
    • Nystrom, M.1
  • 22
    • 3042546730 scopus 로고    scopus 로고
    • HTML code injection and cross-site scripting
    • Technical report, Technicallnfo
    • G. Ollmann. HTML code injection and cross-site scripting. Technical report, Technicallnfo.
    • Ollmann, G.1
  • 23
    • 84889403836 scopus 로고    scopus 로고
    • Advanced cross-site-scripting with real-time remote attacker
    • Technical report, Avaya Labs, February
    • A. Rager. Advanced cross-site-scripting with real-time remote attacker. Technical report, Avaya Labs, February 2005.
    • (2005)
    • Rager, A.1
  • 24
    • 84889494218 scopus 로고    scopus 로고
    • Optimal time to patch revisited
    • RTFM.com working paper
    • E. Rescorla. Optimal time to patch revisited. RTFM.com working paper.
    • Rescorla, E.1
  • 25
    • 84863469085 scopus 로고    scopus 로고
    • Stronger password authentication using browser extensions
    • In Proceedings of the 14th Usenix Security Symposium
    • B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. In Proceedings of the 14th Usenix Security Symposium, 2005.
    • (2005)
    • Ross, B.1    Jackson, C.2    Miyake, N.3    Boneh, D.4    Mitchell, J.C.5
  • 26
    • 62349114967 scopus 로고    scopus 로고
    • Shoulder surfing resistant graphical passwords
    • Draft of April
    • L. Sobrado and J. C. Birget. Shoulder surfing resistant graphical passwords. http://clam.rutgers.edu/~birget/grPssw/srgp.pdf, Draft of April 2005.
    • (2005)
    • Sobrado, L.1    Birget, J.C.2
  • 27
    • 38349038696 scopus 로고    scopus 로고
    • Sender policy framework (SPF) for authorizing use of domains in e-mail
    • Internet Draft, June
    • M. Wong and W. Schlitt. Sender policy framework (SPF) for authorizing use of domains in e-mail. Internet Draft, June 2005.
    • (2005)
    • Wong, M.1    Schlitt, W.2
  • 28
    • 84889273055 scopus 로고    scopus 로고
    • Do security toolbars actually present phishing attacks?
    • In Symposium On Usable Privacy and Security
    • M. Wu, R. Miller, and S. Garfinkel. Do security toolbars actually present phishing attacks? In Symposium On Usable Privacy and Security 2005.
    • (2005)
    • Wu, M.1    Miller, R.2    Garfinkel, S.3
  • 29
    • 0003331619 scopus 로고    scopus 로고
    • The secure remote password protocol
    • In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, March
    • T. Wu. The secure remote password protocol. In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, March 1998.
    • (1998)
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.