2008
DOI: 10.1145/1391949.1391950
|View full text |Cite
|
Sign up to set email alerts
|

Security and identification indicators for browsers against spoofing and phishing attacks

Abstract: In spite of the use of standard Web security measures (SSL/TLS), users enter sensitive information such as passwords into fake Web sites. Such fake sites cause substantial damages to individuals and corporations. In this work, we identify several vulnerabilities of browsers, focusing on security and identification indicators.We present improved security and identification indicators, as we implemented in TrustBar, a browser extension we developed. With TrustBar, users can assign a name or logo to identify SSL/… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
64
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 100 publications
(65 citation statements)
references
References 25 publications
1
64
0
Order By: Relevance
“…This algorithm was instigated in PHP and radical java. Amir Herzberg, Ahmad Jbara et al [8] pronounced that at this time web users, and in specificadolescentconsumers, are susceptible topoles apartweb spoofing bouts; and away, phishing and spoofingattacks are in datumprogressivelyconjoint. They premeditated, instigated and veteranbrowser and protocol leeway, that will aidperceive web-spoofing and phishing attacks.…”
Section: Literature Analysismentioning
confidence: 99%
“…This algorithm was instigated in PHP and radical java. Amir Herzberg, Ahmad Jbara et al [8] pronounced that at this time web users, and in specificadolescentconsumers, are susceptible topoles apartweb spoofing bouts; and away, phishing and spoofingattacks are in datumprogressivelyconjoint. They premeditated, instigated and veteranbrowser and protocol leeway, that will aidperceive web-spoofing and phishing attacks.…”
Section: Literature Analysismentioning
confidence: 99%
“…It is often easier for attackers to exploit human and social weaknesses of the defences than to defeat the technological countermeasures [18]. This is also evident in anti-phishing literature as most research focused on technical solutions such as: developing browser toolbars/plug-ins [23] preventative measures, characteristics and email structure [6], [20], [22], algorithms for detecting, identifying and measuring phishing emails and sites [8], [11], [32] and evaluating the effectiveness of web browser toolbar warnings/indicators [4], [7], [12], [31]. Many employees cannot identify the difference between a genuine and a spoofed website [4], [21].…”
Section: The Need For a Holistic Anti-phishing Frameworkmentioning
confidence: 99%
“…To attempt to improve how trust decisions are made, substantial efforts have been made to better convey statements of security to users [1,3,9,12,20,29] and more generally, to educate users about the need to pay attention to security indicators [19,23]. While we are not against such efforts, we think of them as last resortsapproaches to take in the absence of automated protection mechanisms.…”
Section: Related Workmentioning
confidence: 99%