Design of the {EROS} Trusted Window System

JS Shapiro, J Vanderburgh, E Northup… - 13th USENIX Security …, 2004 - usenix.org
Window systems are the primary mediator of user input and output in modern computing
systems. They are also a commonly used interprocess communication mechanism. As a …

Interface illusions

E Levy - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Phishing (the act of conning a person into divulging sensitive information) commonly uses
legitimate-looking Web sites that mimic the online interface of the institution the attacker is …

[PDF][PDF] Building a trusted path for applications using COTS components

H Langweg - Proc. NATO RTS IST Panel Symposium on Adaptive …, 2004 - sto.nato.int
Building a Trusted Path for Applications Using COTS Components Page 1 RTO-MP-IST-041
21 - 1 Building a Trusted Path for Applications Using COTS Components Hanno Langweg …

Secure visualization of authentication information: A case study

S Cannella, DJ Polivy, M Shin, C Straub… - … IEEE Symposium on …, 2004 - ieeexplore.ieee.org
The open nature of the Web makes it possible to create spoofed Web pages which, to the
casual observer, are indistinguishable from authentic pages. The defense against Web …

[PDF][PDF] Expressing trust in distributed systems: the mismatch between tools and reality

SW Smith, C Masone, S Sinclair - Forty-Second Annual Allerton …, 2004 - cs.dartmouth.edu
Distributed systems typically support processes that involve humans separated by space
and by organizational boundaries. Because of its ability to enable secure communications …

[图书][B] Firewalls und Sicherheit im Internet: Schutz vor cleveren Hackern

WR Cheswick - 2004 - books.google.com
Page 1 net.com networking & communications William R. Cheswick, Steven M. Bellovin, Aviel D.
Rubin O Firewalls und Sicherheit 2., aktualisierte Auflage Deutsche Übersetzung von Thomas …

Remotely Keyed CryptoGraphics-Secure Remote Display Access Using (Mostly) Untrusted Hardware-Extended Version

DL Cook, RA Baratto, AD Keromytis - 2004 - academiccommons.columbia.edu
Software that covertly monitors user actions, also known as spyware, has become a first-
level security threat due to its ubiquity and the difficulty of detecting and removing it. Such …