2008 2nd International Conference on Internet Multimedia Services Architecture and Applications 2008
DOI: 10.1109/imsaa.2008.4753929
|View full text |Cite
|
Sign up to set email alerts
|

PhishGuard: A browser plug-in for protection from phishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 3 publications
0
20
0
Order By: Relevance
“…However, the real credentials are still susceptible to phishing since they are also sent along with those fake credentials. An alternative of this technique is to submit fake credentials without submitting the real ones (Joshi, et al 2008). based on what image he expects with an image generated by the server.…”
Section: Instantaneous Based Protection Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the real credentials are still susceptible to phishing since they are also sent along with those fake credentials. An alternative of this technique is to submit fake credentials without submitting the real ones (Joshi, et al 2008). based on what image he expects with an image generated by the server.…”
Section: Instantaneous Based Protection Approachmentioning
confidence: 99%
“…However, the real credentials are still susceptible to phishing since they are also sent along with those fake credentials. An alternative of this technique is to submit fake credentials without submitting the real ones (Joshi, et al 2008). To overcome the problems that arose in (Kirda and Kruegel 2005) a new technique which basically making use of HTML DOM and layout similarity based approach has been proposed in (Angelo, et al 2007).…”
mentioning
confidence: 99%
“…However, it cannot be able to detect zero-day phishing attacks, because it is not detected yet. Google Safe Browsing API [8] enables client applications to validate whether a given URI exists in blacklists and updates constantly. The current implementation of the protocol is provided by Google, and only consists of two blacklists named 'goog-phish-shavar' and 'goog-malware-shavar', for phishing and malware respectively.…”
Section: B Website Phishing Detectionmentioning
confidence: 99%
“…A similar approach has been applied by Joshi et al [27] (the PhishGuard tool) who intercept user submitted credentials. However, to hide an actual supplied credential, they send another set of fake credentials at the end.…”
Section: Phishing Attack Detectionmentioning
confidence: 99%