[图书][B] Trust me: Design patterns for constructing trustworthy trust indicators

S Egelman - 2009 - search.proquest.com
In a world where making an incorrect online trust decision can mean giving away highly
personal information to a con artist, Internet users need effective online trust indicators to …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2018 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environment is …

Can a mobile game teach computer users to thwart phishing attacks?

NAG Arachchilage, S Love, C Maple - arXiv preprint arXiv:1511.01622, 2015 - arxiv.org
Phishing is an online fraudulent technique, which aims to steal sensitive information such as
usernames, passwords and online banking details from its victims. To prevent this, anti …

Fighting phishing at the user interface

M Wu - 2006 - dspace.mit.edu
The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email
messages and web sites designed to look as if they come from a known and legitimate …

Trust management for public key infrastructures: Implementing the X. 509 trust broker

AS Wazan, R Laborde, DW Chadwick… - Security and …, 2017 - Wiley Online Library
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to
propagate trust in authentication over the Internet. This technology is based on a trust model …

Protecting sensitive web content from client-side vulnerabilities with CRYPTONS

X Dong, Z Chen, H Siadati, S Tople, P Saxena… - Proceedings of the …, 2013 - dl.acm.org
Web browsers isolate web origins, but do not provide direct abstractions to isolate sensitive
data and control computation over it within the same origin. As a result, guaranteeing …

{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs

G Petracca, Y Sun, AA Reineh, P McDaniel… - 28th USENIX Security …, 2019 - usenix.org
Modern operating systems support a cooperating program abstraction that, instead of
placing all functionality into a single program, allows diverse programs to cooperate to …

A study of man-in-the-middle attack based on SSL certificate interaction

J Du, X Li, H Huang - 2011 First International Conference on …, 2011 - ieeexplore.ieee.org
With the rapid development of Internet technology, network technology has penetrated into
every part of the economic society. However, due to the open Internet and anonymity of the …

DriverGuard: A fine-grained protection on I/O flows

Y Cheng, X Ding, RH Deng - … : 16th European Symposium on Research in …, 2011 - Springer
Most commodity peripheral devices and their drivers are geared to achieve high
performance with security functions being opted out. The absence of security measures …

Cracking shadowcrypt: Exploring the limitations of secure I/O systems in internet browsers

M Freyberger, W He, D Akhawe… - … on Privacy Enhancing …, 2018 - petsymposium.org
An important line of privacy research is investigating the design of systems for secure input
and output (I/O) within Internet browsers. These systems would allow for users' information to …