Herzberg, 2009 - Google Patents
Why Johnny can't surf (safely)? Attacks and defenses for web usersHerzberg, 2009
View PDF- Document ID
- 14281980727049416758
- Author
- Herzberg A
- Publication year
- Publication venue
- computers & security
External Links
Snippet
In their seminal article “Why Johnny Can't Encrypt”[Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.], Whitten and Tygar showed that usability weaknesses of …
- 235000010956 sodium stearoyl-2-lactylate 0 abstract 4
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Herzberg | Why Johnny can't surf (safely)? Attacks and defenses for web users | |
Dhamija et al. | The battle against phishing: Dynamic security skins | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
Karlof et al. | Dynamic pharming attacks and locked same-origin policies for web browsers | |
Clark et al. | SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements | |
Jackson et al. | Forcehttps: protecting high-security web sites from network attacks | |
Sun et al. | The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems | |
Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
Armando et al. | An authentication flaw in browser-based single sign-on protocols: Impact and remediations | |
CN108234519A (en) | Detect and prevent the man-in-the-middle attack on encryption connection | |
EP2572489B1 (en) | System and method for protecting access to authentication systems | |
Bojjagani et al. | PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification | |
Luevanos et al. | Analysis on the security and use of password managers | |
Bates et al. | Forced perspectives: Evaluating an SSL trust enhancement at scale | |
Johns et al. | BetterAuth: web authentication revisited | |
Calzavara et al. | Sub-session hijacking on the web: Root causes and prevention | |
Badra et al. | Phishing attacks and solutions | |
Li et al. | Mitigating csrf attacks on oauth 2.0 systems | |
Aljawarneh et al. | A web client authentication system using smart card for e-systems: initial testing and evaluation | |
Sood et al. | Dynamic identity‐based single password anti‐phishing protocol | |
Karthiga et al. | Enhancing performance of user authentication protocol with resist to password reuse attacks | |
Bao et al. | Towards the trust-enhancements of single sign-on services | |
Krishnaraj et al. | Common vulnerabilities in real world web applications. | |
Joseph et al. | Cookie based protocol to defend malicious browser extensions | |
Garg et al. | Security techniques for cloud computing environment |