2005
DOI: 10.1145/1065545.1065546
|View full text |Cite
|
Sign up to set email alerts
|

Trusted paths for browsers

Abstract: Computer security protocols usually terminate in a computer; however, the human-based services which they support usually terminate in a human. The gap between the human and the computer creates potential for security problems. We examine this gap, as it is manifested in secure Web servers. Felten et al. demonstrated the potential, in 1996, for malicious servers to impersonate honest servers. In this paper, we show how malicious servers can still do this-and can also forge the existence of an SSL session and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
82
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(88 citation statements)
references
References 10 publications
1
82
0
Order By: Relevance
“…These approaches seek to detect known good sites. Some whitelisting approaches use server side validation to add additional authentication metrics to client browsers as a proof of its benign nature, for examples, dynamic security skins [7]; trust bar [8] and SRD ("Synchronized Random Dynamic Boundaries") [9].…”
Section: Related Workmentioning
confidence: 99%
“…These approaches seek to detect known good sites. Some whitelisting approaches use server side validation to add additional authentication metrics to client browsers as a proof of its benign nature, for examples, dynamic security skins [7]; trust bar [8] and SRD ("Synchronized Random Dynamic Boundaries") [9].…”
Section: Related Workmentioning
confidence: 99%
“…d) Dynamic security skins. Anti-phishing techniques such as synchronized random dynamic boundary [48] and dynamic security skins [15] can be used as a means to identify an authentic server, and to communicate success/failure messages to a client browser. Note that, Uvauth's security does not require these visual cues to be 100% reliable, or always correctly matched by users; they simply provide an additional channel for session verification.…”
Section: Additional Login Help For Legitimate Usersmentioning
confidence: 99%
“…The first approach focuses on building tools or toolbars to enhance the security of a login process. Ye and Smith [30] designed a prototype of "Trusted Path" to convey relevant trust signals from a web browser to a human user. Dhamija and Tygar [5] proposed "Dynamic Security Skins" to allow a legitimate web site to prove its identity in a way that is easy for a user to verify but hard for a phisher to spoof.…”
Section: Related Workmentioning
confidence: 99%