-
1
-
-
84867017590
-
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
-
ARMANDO, A., CARBONE, R., COMPAGNA, L., CUELLAR, J., AND TOBARRA, L. Formal analysis of saml 2.0 web browser single sign-on: breaking the saml-based single sign-on for google apps. In ACM FMSE (2008).
-
(2008)
ACM FMSE
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
2
-
-
84969213773
-
Discovering concrete attacks on website authorization by formal analysis
-
BANSAL, C., BHARGAVAN, K., AND MAFFEIS, S. Discovering concrete attacks on website authorization by formal analysis. In IEEE CSF (2012).
-
(2012)
IEEE CSF
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
3
-
-
34249856296
-
Decision strategies and susceptibility to phishing
-
DOWNS, J. S., HOLBROOK, M. B., AND CRANOR, L. F. Decision strategies and susceptibility to phishing. In SOUPS (2006).
-
(2006)
SOUPS
-
-
Downs, J.S.1
Holbrook, M.B.2
Cranor, L.F.3
-
4
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
GARERA, S., PROVOS, N., CHEW, M., AND RUBIN, A. D. A framework for detection and measurement of phishing attacks. In WORM (2007).
-
(2007)
WORM
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
5
-
-
34249852316
-
Designing ethical phishing experiments: A study of (ROT13) ronl query features
-
JAKOBSSON, M., AND RATKIEWICZ, J. Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In WWW (2006).
-
(2006)
WWW
-
-
Jakobsson, M.1
Ratkiewicz, J.2
-
6
-
-
60649111016
-
On the effectiveness of techniques to detect phishing sites
-
LUDL, C., MCALLISTER, S., KIRDA, E., AND KRUEGEL, C. On the effectiveness of techniques to detect phishing sites. In DIMVA (2007).
-
(2007)
DIMVA
-
-
Ludl, C.1
McAllister, S.2
Kirda, E.3
Kruegel, C.4
-
7
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
MA, J., SAUL, L. K., SAVAGE, S., AND VOELKER, G. M. Beyond blacklists: learning to detect malicious web sites from suspicious urls. In SIGKDD (2009).
-
(2009)
SIGKDD
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
9
-
-
84869401890
-
The devil is in the (implementation) details: An empirical analysis of oauth sso systems
-
SUN, S.-T., AND BEZNOSOV, K. The devil is in the (implementation) details: an empirical analysis of oauth sso systems. In CCS (2012).
-
(2012)
CCS
-
-
Sun, S.-T.1
Beznosov, K.2
-
10
-
-
84855678652
-
What makes users refuse web single sign-on?: An empirical investigation of openid
-
SUN, S.-T., POSPISIL, E., MUSLUKHOV, I., DINDAR, N., HAWKEY, K., AND BEZNOSOV, K. What makes users refuse web single sign-on?: an empirical investigation of openid. In SOUPS (2011).
-
(2011)
SOUPS
-
-
Sun, S.-T.1
Pospisil, E.2
Muslukhov, I.3
Dindar, N.4
Hawkey, K.5
Beznosov, K.6
-
11
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
-
WANG, R., CHEN, S., AND WANG, X. Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In the IEEE Symposium on Security and Privacy (2012).
-
(2012)
The IEEE Symposium on Security and Privacy
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
12
-
-
85006397404
-
Large-scale automatic classification of phishing pages
-
WHITTAKER, C., RYNER, B., AND NAZIF, M. Large-scale automatic classification of phishing pages. In NDSS (2010).
-
(2010)
NDSS
-
-
Whittaker, C.1
Ryner, B.2
Nazif, M.3
-
13
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
ZHANG, Y., HONG, J., AND CRANOR, L. CANTINA: A content-based approach to detecting phishing web sites. In WWW (2007).
-
(2007)
WWW
-
-
Zhang, Y.1
Hong, J.2
Cranor, L.3
-
17
-
-
84870856724
-
-
OpenID Phishing Brainstorm. http://wiki.openid.net/w/page/12995216/OpenID_Phishing_Brainstorm.
-
OpenID Phishing Brainstorm
-
-
-
21
-
-
84880687690
-
-
What is OpenID? http://openid.net/get-an-openid/what-is-openid/.
-
What Is OpenID?
-
-
|