-
2
-
-
84878830000
-
A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware
-
Dec.
-
E. Kalige and D. Burkey, "A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware," Versafe and Check Point, Tel Aviv, Israel, Tech. Rep., Dec. 2012.
-
(2012)
Versafe and Check Point, Tel Aviv, Israel, Tech. Rep.
-
-
Kalige, E.1
Burkey, D.2
-
3
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, NY, USA
-
A. Porter Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. 1st ACM Workshop, New York, NY, USA, 2011, pp. 3-14.
-
(2011)
Proc. 1st ACM Workshop
, pp. 3-14
-
-
Porter Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
4
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
Apr.
-
N. Leavitt, "Mobile phones: The next frontier for hackers?" Computer, vol. 38, no. 4, pp. 20-23, Apr. 2005.
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
10
-
-
49249126891
-
The Zurich Trusted Information ChannelVAn efficient defence against man-in-the-middle and malicious software attacks
-
P. Lipp, A.-R. Sadeghi, and K.-M. Koch, Eds, ser. Lecture Notes in Computer Science
-
T. Weigold, T. Kramp, R. Hermann, F. Höring, P. Buhler, and M. Baentsch, "The Zurich Trusted Information ChannelVAn efficient defence against man-in-the-middle and malicious software attacks," in Proc.1st Int. Conf. Trusted Comput. Trust Inf. Technol., Trusted Comput.-Challenges Appl., vol. 4968, P. Lipp, A.-R. Sadeghi, and K.-M. Koch, Eds., 2008, pp. 75-91, ser. Lecture Notes in Computer Science.
-
(2008)
Proc.1st Int. Conf. Trusted Comput. Trust Inf. Technol., Trusted Comput.-Challenges Appl.
, vol.4968
, pp. 75-91
-
-
Weigold, T.1
Kramp, T.2
Hermann, R.3
Höring, F.4
Buhler, P.5
Baentsch, M.6
-
12
-
-
84864552184
-
Review of browser extensions, a man-in-the browser phishing techniques targeting bank customers
-
Perth, WA, Australia
-
N. Utakrit, "Review of browser extensions, a man-in-the browser phishing techniques targeting bank customers," in Proc. 7th Australian Inf. Security Manag. Conf., Perth, WA, Australia, 2009, pp. 110-119.
-
(2009)
Proc. 7th Australian Inf. Security Manag. Conf.
, pp. 110-119
-
-
Utakrit, N.1
-
13
-
-
31344439511
-
SSL man-in-the-middle Attacks
-
[Online]. Available
-
P. Burkholder, "SSL man-in-the-middle Attacks," in SANS Inst. Reading Room, 2002. [Online]. Available: http://www.sans.org/reading-room/whitepapers/threats/ssl-man-in-the-middleattacks- 480
-
(2002)
SANS Inst. Reading Room
-
-
Burkholder, P.1
-
14
-
-
84863169434
-
HPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers
-
Gros Islet, St. Lucia
-
S. Li, A. Sadeghi, S. Heisrath, R. Schmitz, and J. Ahmad, "hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers," in Proc. 15th Int. Conf. Financial Cryptography Data Sec., Gros Islet, St. Lucia, 2011, pp. 235-249.
-
(2011)
Proc. 15th Int. Conf. Financial Cryptography Data Sec.
, pp. 235-249
-
-
Li, S.1
Sadeghi, A.2
Heisrath, S.3
Schmitz, R.4
Ahmad, J.5
-
15
-
-
33749420891
-
-
Sebastopol, CA, USA: O'Reilly Media, Inc
-
L. Faith-Cranor and S. Garfinkel, Eds., Security and Usability: Designing Secure Systems that People Can Use. Sebastopol, CA, USA: O'Reilly Media, Inc., 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
-
-
Faith-Cranor, L.1
Garfinkel, S.2
-
17
-
-
84930656920
-
-
[Online]. Available
-
MFi Program, Apple, Inc. [Online]. Available: https://developer. apple.com/programs/mfi/
-
-
-
MFi Program, Apple, Inc.,1
-
19
-
-
84875683653
-
-
[Online]. Available
-
BEMC2," in RSA SecurID. [Online]. Available: http://www.emc. com/security/rsa-securid.htm
-
RSA SecurID
-
-
BEMC21
-
20
-
-
16444376120
-
Two-factor authentication: Too little, too late
-
Apr.
-
B. Schneier, "Two-factor authentication: Too little, too late," Commun. ACM, vol. 48, no. 4, p. 136, Apr. 2005.
-
(2005)
Commun. ACM
, vol.48
, Issue.4
, pp. 136
-
-
Schneier, B.1
-
21
-
-
84930673232
-
Enhancing authentication in eBanking with NFC-enabled mobile phones
-
M.S. thesis,., Tech. Univ. Eindhoven, Eindhoven, The Netherlands
-
D. A. Ortiz-Yepes, "Enhancing authentication in eBanking with NFC-enabled mobile phones," M.S. thesis, Dept. Math. Comput. Sci., Tech. Univ. Eindhoven, Eindhoven, The Netherlands, 2008.
-
(2008)
Dept. Math. Comput. Sci
-
-
Ortiz-Yepes, D.A.1
-
22
-
-
84930682973
-
-
[Online]. Available
-
CrontoSign Mobile App, Cronto. [Online]. Available: http://www. cronto.com/crontosign-transaction-authentication-mobile.htm
-
-
-
-
23
-
-
70349653942
-
QR-TAN: Secure mobile transaction authentication
-
G. Starnberger, L. Froihofer, and K. Goeschka, "QR-TAN: Secure mobile transaction authentication," in Proc. Int. Conf. Avail. Rel. Security, 2009, pp. 578-583.
-
(2009)
Proc. Int. Conf. Avail. Rel. Security
, pp. 578-583
-
-
Starnberger, G.1
Froihofer, L.2
Goeschka, K.3
-
24
-
-
84930641654
-
-
[Online]. Available
-
CrontoSign Device, Cronto. [Online]. Available: http://www. cronto.com/crontosign-transaction-authentication-device.htm
-
CrontoSign Device, Cronto
-
-
|