2006
DOI: 10.1007/11889663_1
|View full text |Cite
|
Sign up to set email alerts
|

Phoolproof Phishing Prevention

Abstract: Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the number of reports in December 2004 [3]. $150,000 [17]. For financial institutions, phishing is a particularly insidious problem, since trust forms the foundation for customer relationships, and phishing attacks undermine confidence in an institution. Phishing attacks succeed by exploiting a user's inability to distinguish legitimate sites fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
91
0
3

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 141 publications
(96 citation statements)
references
References 14 publications
1
91
0
3
Order By: Relevance
“…Mobile-assisted authentication schemes [7,22,23,27] have been proposed to protect the user from stealing the password on an insecure computer or from phishing attacks. In these diagrams, it is assumed that mobile devices are reliable and capable of performing certain computer operations such as hashing.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Mobile-assisted authentication schemes [7,22,23,27] have been proposed to protect the user from stealing the password on an insecure computer or from phishing attacks. In these diagrams, it is assumed that mobile devices are reliable and capable of performing certain computer operations such as hashing.…”
Section: Related Workmentioning
confidence: 99%
“…The password is the actual method for web authentication [1]. However, it cannot provide sufficient protection for password authentication only, because the mechanism is prone to many attacks such as shoulder surfing attack [2], brute force password guessing attack [3][4][5], man in the middle (MITM) attack [6] and phishing attack [7,8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the idea of using a personal (mobile) device to improve security in practice has been studied in several previous papers. In [18], Parno et al use a mobile phone to set up secure SSL/TLS connections and in [15], Mannan and Oorschot use a personal device to improve security of password authentication. Both solutions basically aim to do user authentication with improved security, in particular to protect against key-logging and phising.…”
Section: Related Workmentioning
confidence: 99%
“…한편, 피싱/파밍을 방지하기 위한 많은 기술적인 연 구들이 있어 왔다 [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18] . ② Portal site should provide bank site registration menu on a user account window.…”
unclassified