Sciweavers

33 search results - page 2 / 7
» BogusBiter: A transparent protection against phishing attack...
Sort
View
GLOBECOM
2008
IEEE
13 years 6 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
TRUSTBUS
2005
Springer
13 years 10 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 27 days ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
AIMS
2009
Springer
13 years 12 months ago
Scalable Detection and Isolation of Phishing
Abstract. This paper presents a proposal for scalable detection and isolation of phishing. The main ideas are to move the protection from end users towards the network provider and...
Giovane C. M. Moura, Aiko Pras
CONEXT
2009
ACM
13 years 6 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...