[go: up one dir, main page]

Herzberg, 2009 - Google Patents

Why Johnny can't surf (safely)? Attacks and defenses for web users

Herzberg, 2009

View PDF
Document ID
14281980727049416758
Author
Herzberg A
Publication year
Publication venue
computers & security

External Links

Snippet

In their seminal article “Why Johnny Can't Encrypt”[Whitten A, Tygar JD. Why Johnny can't encrypt: a usability case study of PGP 5.0. In: Proceedings of the eighth USENIX security symposium; August 1999.], Whitten and Tygar showed that usability weaknesses of …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Herzberg Why Johnny can't surf (safely)? Attacks and defenses for web users
Dhamija et al. The battle against phishing: Dynamic security skins
Huang et al. Using one-time passwords to prevent password phishing attacks
Karlof et al. Dynamic pharming attacks and locked same-origin policies for web browsers
Clark et al. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Jackson et al. Forcehttps: protecting high-security web sites from network attacks
Sun et al. The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
Li et al. Analysing the Security of Google’s implementation of OpenID Connect
Armando et al. An authentication flaw in browser-based single sign-on protocols: Impact and remediations
CN108234519A (en) Detect and prevent the man-in-the-middle attack on encryption connection
EP2572489B1 (en) System and method for protecting access to authentication systems
Bojjagani et al. PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification
Luevanos et al. Analysis on the security and use of password managers
Bates et al. Forced perspectives: Evaluating an SSL trust enhancement at scale
Johns et al. BetterAuth: web authentication revisited
Calzavara et al. Sub-session hijacking on the web: Root causes and prevention
Badra et al. Phishing attacks and solutions
Li et al. Mitigating csrf attacks on oauth 2.0 systems
Aljawarneh et al. A web client authentication system using smart card for e-systems: initial testing and evaluation
Sood et al. Dynamic identity‐based single password anti‐phishing protocol
Karthiga et al. Enhancing performance of user authentication protocol with resist to password reuse attacks
Bao et al. Towards the trust-enhancements of single sign-on services
Krishnaraj et al. Common vulnerabilities in real world web applications.
Joseph et al. Cookie based protocol to defend malicious browser extensions
Garg et al. Security techniques for cloud computing environment