[图书][B] Trust me: Design patterns for constructing trustworthy trust indicators
S Egelman - 2009 - search.proquest.com
In a world where making an incorrect online trust decision can mean giving away highly
personal information to a con artist, Internet users need effective online trust indicators to …
personal information to a con artist, Internet users need effective online trust indicators to …
Methods, systems, and media for detecting covert malware
BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2018 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environment is …
some embodiments, a method for detecting covert malware in a computing environment is …
Can a mobile game teach computer users to thwart phishing attacks?
Phishing is an online fraudulent technique, which aims to steal sensitive information such as
usernames, passwords and online banking details from its victims. To prevent this, anti …
usernames, passwords and online banking details from its victims. To prevent this, anti …
Fighting phishing at the user interface
M Wu - 2006 - dspace.mit.edu
The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email
messages and web sites designed to look as if they come from a known and legitimate …
messages and web sites designed to look as if they come from a known and legitimate …
Trust management for public key infrastructures: Implementing the X. 509 trust broker
A Public Key Infrastructure (PKI) is considered one of the most important techniques used to
propagate trust in authentication over the Internet. This technology is based on a trust model …
propagate trust in authentication over the Internet. This technology is based on a trust model …
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
Web browsers isolate web origins, but do not provide direct abstractions to isolate sensitive
data and control computation over it within the same origin. As a result, guaranteeing …
data and control computation over it within the same origin. As a result, guaranteeing …
{EnTrust}: Regulating Sensor Access by Cooperating Programs via Delegation Graphs
Modern operating systems support a cooperating program abstraction that, instead of
placing all functionality into a single program, allows diverse programs to cooperate to …
placing all functionality into a single program, allows diverse programs to cooperate to …
A study of man-in-the-middle attack based on SSL certificate interaction
J Du, X Li, H Huang - 2011 First International Conference on …, 2011 - ieeexplore.ieee.org
With the rapid development of Internet technology, network technology has penetrated into
every part of the economic society. However, due to the open Internet and anonymity of the …
every part of the economic society. However, due to the open Internet and anonymity of the …
DriverGuard: A fine-grained protection on I/O flows
Most commodity peripheral devices and their drivers are geared to achieve high
performance with security functions being opted out. The absence of security measures …
performance with security functions being opted out. The absence of security measures …
Cracking shadowcrypt: Exploring the limitations of secure I/O systems in internet browsers
M Freyberger, W He, D Akhawe… - … on Privacy Enhancing …, 2018 - petsymposium.org
An important line of privacy research is investigating the design of systems for secure input
and output (I/O) within Internet browsers. These systems would allow for users' information to …
and output (I/O) within Internet browsers. These systems would allow for users' information to …