Sciweavers

6 search results - page 1 / 2
» Phishing Attacks: Analyzing Trends in 2006
Sort
View
CEAS
2007
Springer
13 years 11 months ago
Phishing Attacks: Analyzing Trends in 2006
Zulfikar Ramzan, Candid Wueest
WWW
2006
ACM
14 years 6 months ago
Invasive browser sniffing and countermeasures
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...
Markus Jakobsson, Sid Stamm
CHI
2006
ACM
14 years 5 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
JDFP
2006
109views more  JDFP 2006»
13 years 5 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
WWW
2006
ACM
14 years 6 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...