메뉴 건너뛰기




Volumn , Issue , 2014, Pages 671-686

On the effective prevention of TLS man-in-the-middle attacks in web applications

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SEEBECK EFFECT;

EID: 84940393598     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (33)

References (52)
  • 1
    • 85080668754 scopus 로고    scopus 로고
    • The Heartbleed Bug. http://heartbleed.com/.
  • 8
    • 85180628981 scopus 로고    scopus 로고
    • Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud
    • BIRGISSON, A., and POLITZ., J. G., ERLINGSSON, U., TALY, A., VRABLE, M., and LENTCZNER, M. Macaroons: Cookies with contextual caveats for decentralized authorization in the Cloud. In NDSS, 2014.
    • (2014) NDSS
    • Birgisson, A.1    Politz, J.G.2    Erlingsson, U.3    Taly, A.4    Vrable, M.5    Lentczner, M.6
  • 10
    • 84881218966 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    • CLARK, J., and VAN OORSCHOT, P. C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In IEEE SP (Oakland), 2013.
    • (2013) IEEE SP (Oakland)
    • Clark, J.1    Van Oorschot, P.C.2
  • 13
    • 84869430752 scopus 로고    scopus 로고
    • Strengthening user authentication through opportunistic cryptographic identity assertions
    • CZESKIS, A., DIETZ, M., KOHNO, T., WALLACH, D., and BALFANZ, D. Strengthening user authentication through opportunistic cryptographic identity assertions. In CCS, 2012.
    • (2012) CCS
    • Czeskis, A.1    Dietz, M.2    Kohno, T.3    Wallach, D.4    Balfanz, D.5
  • 15
    • 84940397122 scopus 로고    scopus 로고
    • Origin-bound certificates: A fresh approach to strong client authentication for the web
    • DIETZ, M., CZESKIS, A., BALFANZ, D., and WALLACH, D. S. Origin-bound certificates: A fresh approach to strong client authentication for the web. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Dietz, M.1    Czeskis, A.2    Balfanz, D.3    Wallach, D.S.4
  • 16
    • 84951326658 scopus 로고    scopus 로고
    • Hardening persona - Improving federated web login
    • DIETZ, M., and WALLACH, D. S. Hardening Persona - Improving federated web login. In NDSS, 2014.
    • (2014) NDSS
    • Dietz, M.1    Wallach, D.S.2
  • 24
    • 85080791465 scopus 로고    scopus 로고
    • GOOGLE DEVELOPERS. Minimize request overhead. https://developers.google.com/speed/docs/best-practices/request.
    • Minimize Request Overhead
  • 25
    • 85080705379 scopus 로고    scopus 로고
    • GOOGLE DEVELOPERS. Optimize caching. https://developers.google.com/speed/docs/best-practices/caching.
    • Optimize Caching
  • 32
    • 77952370957 scopus 로고    scopus 로고
    • Dynamic pharming attacks and locked same-origin policies for web browsers
    • KARLOF, C., SHANKAR, U., TYGAR, J. D., and WAGNER, D. Dynamic pharming attacks and locked same-origin policies for web browsers. In CCS, 2007.
    • (2007) CCS
    • Karlof, C.1    Shankar, U.2    Tygar, J.D.3    Wagner, D.4
  • 33
    • 84888083218 scopus 로고    scopus 로고
    • Accountable key infrastructure: A proposal for a public-key validation infrastructure
    • KIM, T. H.-J., HUANG, L.-S., PERRIG, A., JACKSON, C., AND GLIGOR, V. Accountable Key Infrastructure: A proposal for a public-key validation infrastructure. In WWW, 2013.
    • (2013) WWW
    • Kim, T.H.-J.1    Huang, L.-S.2    Perrig, A.3    Jackson, C.4    Gligor, V.5
  • 37
  • 39
    • 85020899354 scopus 로고    scopus 로고
    • MOZILLA DEVELOPER NETWORK. Mixed content. https://developer.mozilla.org/en-US/docs/Security/MixedContent.
    • Mixed Content
  • 40
    • 41149151731 scopus 로고    scopus 로고
    • MOZILLA DEVELOPER NETWORK. Same-origin policy. https://developer.mozilla.org/en-US/docs/Web/JavaScript/Same_origin_policy_for_JavaScript.
    • Same-origin Policy
  • 42
    • 33745913964 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
    • OPPLIGER, R., HAUSER, R., and BASIN, D. SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Computer Communications 29, 12 (2006), 2238-2246.
    • (2006) Computer Communications , vol.29 , Issue.12 , pp. 2238-2246
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 43
    • 49849096978 scopus 로고    scopus 로고
    • SSL/TLS session-aware user authentication revisited
    • OPPLIGER, R., HAUSER, R., and BASIN, D. SSL/TLS session-aware user authentication revisited. Computers & Security 27, 3-4 (2008), 64-70.
    • (2008) Computers & Security , vol.27 , Issue.3-4 , pp. 64-70
    • Oppliger, R.1    Hauser, R.2    Basin, D.3
  • 44
    • 84870642502 scopus 로고    scopus 로고
    • OWASP. Cross-site Scripting (XSS). https://www.owasp.org/index.php/Cross-site_Scripting_(XSS).
    • Cross-site Scripting (XSS)
  • 45
    • 85076277090 scopus 로고    scopus 로고
    • OWASP. Man-in-the-browser attack. https://www.owasp.org/index.php/Man-in-the-browser_attack.
    • Man-in-the-browser Attack
  • 47
    • 85180635364 scopus 로고    scopus 로고
    • Practical issues with TLS client certificate authentication
    • PARSOVS, A. Practical issues with TLS client certificate authentication. In NDSS, 2014.
    • (2014) NDSS
    • Parsovs, A.1
  • 49
    • 84893275787 scopus 로고    scopus 로고
    • Certified lies: Detecting and defeating government interception attacks against SSL
    • SOGHOIAN, C., and STAMM, S. Certified lies: Detecting and defeating government interception attacks against SSL. In FC, 2011.
    • (2011) FC
    • Soghoian, C.1    Stamm, S.2
  • 52
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSH-style host authentication with multi-path probing
    • WENDLANDT, D., and ANDERSEN., D. G., and PERRIG, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX ATC, 2008.
    • (2008) USENIX ATC
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.