2012
DOI: 10.1007/978-3-642-35130-3_2
|View full text |Cite
|
Sign up to set email alerts
|

VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…Differences between mobile and desktop websites: All these approaches for malicious webpage detection have focused on websites built for desktop browsers in the past. Mobile browsers have been shown to differ from their desktop counterparts in terms of security [13], [14]. Although differences in mobile and desktop websites have been observed before [19], it is unclear how these differences impact security.…”
Section: Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…Differences between mobile and desktop websites: All these approaches for malicious webpage detection have focused on websites built for desktop browsers in the past. Mobile browsers have been shown to differ from their desktop counterparts in terms of security [13], [14]. Although differences in mobile and desktop websites have been observed before [19], it is unclear how these differences impact security.…”
Section: Related Workmentioning
confidence: 98%
“…Words such as login and bank are commonly used in the URL of the login webpage for benign websites that are highly prone to imitation. Only a part of the URL is visible to the user of a mobile phone due to the small screen [13]. Therefore, intuitively, the author of a phishing webpage will include misleading words at the beginning of the URL.…”
Section: Url Featuresmentioning
confidence: 98%
See 1 more Smart Citation
“…NativeWrap seeks to mitigate such attacks by always clearly displaying the WebView app's name. NativeWrap further pins the WebView app to a domain to ensure phishing does not inadvertently originate from the domain, e.g., via advertisements that hijack the screen [1]. Browser Compromise: Upon compromising the Web browser, an attacker potentially gains access to all of the user's cookies, in- Figure 2: The NativeWrap Architecture cluding those that are used for authentication.…”
Section: Threat Modelmentioning
confidence: 99%
“…1 Results accessed May 14, 2014. 2 Dailymotion plays only the audio part of a video clip occasionally.…”
Section: Slick Dealsmentioning
confidence: 99%