2009
DOI: 10.1007/978-0-387-85555-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The user either needs to store and maintain a particular bookmark for every protected website [1], remember to activate protection before entering her credentials [39], install a plugin [47] or a browser toolbar and regularly verify that it is not spoofed [42], use a dedicated browser [22] or a second device that must be trustworthy but also able to establish a direct connection with the browser [34], or remember every past action with respect to this account [31], while some approaches are not implemented or practically evaluated [16].…”
Section: Sophisticated Authentication Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The user either needs to store and maintain a particular bookmark for every protected website [1], remember to activate protection before entering her credentials [39], install a plugin [47] or a browser toolbar and regularly verify that it is not spoofed [42], use a dedicated browser [22] or a second device that must be trustworthy but also able to establish a direct connection with the browser [34], or remember every past action with respect to this account [31], while some approaches are not implemented or practically evaluated [16].…”
Section: Sophisticated Authentication Protocolsmentioning
confidence: 99%
“…The main goal is to not submit the password in plaintext to an unauthenticated remote server but mutually authenticate client and server [16,42,47], utilize a zero-knowledge protocol to avoid transmitting confidential information [22], check for user-specific knowledge that changes over time [31], use trusted second devices to establish an authenticated session [34], generate site-specific passwords from a seed [39], or use bookmarks as a secure entry point [1].…”
Section: Sophisticated Authentication Protocolsmentioning
confidence: 99%
“…Several studies have been conducted, trying to identify why users fall victim to phishing attacks [5,7] and various solutions have been suggested, such as the use of per-site "pageskinning" [4], security toolbars [23], images [2,17], trusted password windows [16], use of past-activity knowledge [11] and automatic analysis of the content within a page [24]. Unfortunately, the problem is hard to address in a completely automatic way, and thus, the current deployed antiphishing mechanisms in popular browsers are all black-list based [15].…”
Section: Related Workmentioning
confidence: 99%