2005
DOI: 10.1007/978-3-540-31979-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(47 citation statements)
references
References 3 publications
0
47
0
Order By: Relevance
“…By using official-looking logos or address bars with the typical padlock icon demonstrating encrypted communication, users can be fooled into believing they are on a secure website and entering sensitive information which the user will steal [Adelsbach et al 2005]. …”
Section: Ap1 Es2mentioning
confidence: 99%
“…By using official-looking logos or address bars with the typical padlock icon demonstrating encrypted communication, users can be fooled into believing they are on a secure website and entering sensitive information which the user will steal [Adelsbach et al 2005]. …”
Section: Ap1 Es2mentioning
confidence: 99%
“…For example, SSLock [37] intelligently makes the final decision on behalf of users. Adelsbach et al [38] and Xia et al [39] improved the human interface to make users be clearly aware when suspicious certificates are detected by browsers.…”
Section: Related Workmentioning
confidence: 99%
“…However, a weird image may also alert the client that an attack is under way. Moreover, Horton et al [7] and Paoli et al [8] adopted the patch method.…”
Section: Related Workmentioning
confidence: 99%
“…Our solution has some following advantages compared with the previous countermeasures: (1) Relax user's burden: our solution aims to remove the burden of the users by automating the process of detection and recognition of the web-spoofing for SSL-enabled communication; (2) Ease of usage: this scheme has little intrusive on the browser while other countermeasures may disable Java Script, pop-up windows (e.g., [9])or change the color of the boundaries (e.g., [6]); (3) Machineindependent: This scheme can be implemented in trusted PC at Internet Cafe without requiring personal folders with individually chosen background bitmaps (e.g., [8]). …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation