Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2010
BogusBiter: A transparent protection against phishing attacks
ACM Transactions on Internet Technology (TOIT), Volume 10, Issue 2Article No.: 6, Pages 1–31https://doi.org/10.1145/1754393.1754395Many anti-phishing mechanisms currently focus on helping users verify whether a Web site is genuine. However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect Internet ...
- ArticleMay 2007
Exposing private information by timing web applications
WWW '07: Proceedings of the 16th international conference on World Wide WebPages 621–628https://doi.org/10.1145/1242572.1242656We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures response times from a web site to expose private information such as ...
- ArticleMay 2006
Protecting browser state from web privacy attacks
WWW '06: Proceedings of the 15th international conference on World Wide WebPages 737–744https://doi.org/10.1145/1135777.1135884Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users against their wishes. This tracking is possible because persistent, client-...
- ArticleApril 2006
Preventing web-spoofing with automatic detecting security indicator
ISPEC'06: Proceedings of the Second international conference on Information Security Practice and ExperiencePages 112–122https://doi.org/10.1007/11689522_11The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting naïve users from advanced spoofing attacks. In this paper, we analyze the problems within those ...
- ArticleSeptember 2005
Effective protection against phishing and web spoofing
CMS'05: Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia SecurityPages 32–41https://doi.org/10.1007/11552055_4Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect against, mainly because they target non-cryptographic components, such as the user or the user-browser interface. This means ...