A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Phoolproof Phishing Prevention
[chapter]
2006
Lecture Notes in Computer Science
Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the number of reports in December ...
For financial institutions, phishing is a particularly insidious problem, since trust forms the foundation for customer relationships, and phishing attacks undermine confidence in an institution. ...
Instead, we need to research fundamental approaches for preventing phishing. ...
doi:10.1007/11889663_1
fatcat:zsolxhqydvhmtdobi2gkjl5f4u
Preventing Web-Spoofing with Automatic Detecting Security Indicator
[chapter]
2006
Lecture Notes in Computer Science
Bryan Parno, Adrian Perrig, Cynthia Kuo Phoolproof Phishing Prevention. ...
, Modeling and Preventing Phishing Attacks. ...
We proposed an approach-ADSI on preventing web spoofing with the weakest security assumption, which is secure, efficient and easy to use. ...
doi:10.1007/11689522_11
fatcat:czco4eoz6rg3dlefurvq73tjom
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
2014
International Journal of Computer Applications
Another possible risky attacks are related to phishing, malware and key loggers etc. ...
On the contrary, some research represents different approaches to prevent phishing attacks. ...
Users who adopt m-Pass are guaranteed to prevention of phishing attacks.
3) Password Reuse Prevention and Weak Password Avoidance-m-Pass achieves one-time password approach. ...
doi:10.5120/16010-4744
fatcat:ldnlpppm2rgpxnxrayw2ad4qky
Secured Password Technique Using Devices
2014
IOSR Journal of Computer Engineering
This reduces the negative influence of human factors compared to previous schemes, and is the first user authentication protocol to prevent password stealing (i.e., phishing, keylogger, and malware) and ...
also prevent password reuse attacks simultaneously. ...
Prevents
Needed
Phoolproof
Prevents
Prevents
Needed
M.wu
Prevents
Prevents
Needed
Needed
Proposed
System
Prevents
Prevents
Prevents
Needed
Needed ...
doi:10.9790/0661-16585660
fatcat:nfbx7p2rdfeqlbcpli3wbuihre
A Survey on One Time Password
2016
International Journal of Science and Research (IJSR)
To decrease the harm caused by phishing and other attacks, banks, governments, and other industries are deploying One-Time Password systems. ...
Perrig, have proposed a mutual authentication system named Phoolproof, prevention against phishing attack. ...
This prevents some forms of identity theft by making sure that captured username/password cannot be used second time. ...
doi:10.21275/v5i3.nov161818
fatcat:5md7lo6sxnagzfbemht22qa6by
Leveraging personal devices for stronger password authentication from untrusted computers*
2011
Journal of Computer Security
On the other hand, several authentication schemes which use a trusted personal device, generally prevent keyloggers, but do not help against phishing or session hijacking attacks. ...
Most existing or proposed techniques are susceptible to these new attacks, including e.g., Phoolproof [53] and two-factor authentication such as a password and a passcode generator token (e.g., SecurID ...
We thank anonymous referees for their constructive comments which improved the presentation of this work, Bryan Parno for allowing us to access and build on source code of his Phoolproof [53] implementation ...
doi:10.3233/jcs-2010-0412
fatcat:s2jyai2n5fh2hcfr7sge7m2pmm
Countermeasures Against Phishing/Pharming via Portal Site for General Users
일반 사용자를 위한 포털 사이트 경유 피싱/파밍 방지 방안
2015
The Journal of Korean Institute of Communications and Information Sciences
일반 사용자를 위한 포털 사이트 경유 피싱/파밍 방지 방안
ABSTRACT The number of phishing/pharming attacks occurring has increased and consequently, the number of studies on anti-phishing/pharming has also increased. ...
The target sites of phishing/pharming are financial sites, and these have a low connection rate compared to those of portal sites. ...
[6, 7] • a comprehensive method including phishing site detection 2.2 prevention of URL spoofingphishing [8] • a comprehensive method including prevention of url-spoofing-phishing 2.3 Cognitive approach ...
doi:10.7840/kics.2015.40.6.1107
fatcat:san5ms6qpzbu3ffk2bgocmdrw4
I Bought a New Security Token and All I Got Was This Lousy Phish—Relay Attacks on Visual Code Authentication Schemes
[chapter]
2014
Lecture Notes in Computer Science
Parno, Kuo and Perrig's "Phoolproof Phishing Prevention" [16] uses a trusted mobile device to mutually authenticate with remote services from an untrusted terminal, the main objective being to prevent ...
Secure bookmarks As the session phishing attacks presented in this paper rely on the user scanning a relayed visual code, they can, of course, be prevented using a different sort of authentication scheme ...
doi:10.1007/978-3-319-12400-1_19
fatcat:gv7gcn3kazanrg57sbr7m4mrva
Secure, Consumer-Friendly Web Authentication and Payments with a Phone
[chapter]
2012
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Phoolproof [20] is designed as an anti-phishing authentication mechanism. With Phoolproof, Parno et al. require custom software on the PC as well as a bluetooth connection. ...
Snap2Pass clearly prevents offline phishing since the phisher does not obtain a credential that can be used or sold. ...
doi:10.1007/978-3-642-29336-8_2
fatcat:wcjpwhvwrjgm5dxbleaf5kzbr4
Anti-Phishing in Offense and Defense
2008
2008 Annual Computer Security Applications Conference (ACSAC)
Leveraging the power of client-side automatic phishing detection techniques, BogusBiter is complementary to existing preventive anti-phishing approaches. ...
However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect Internet users from revealing their credentials to phishing ...
Researchers have also sought to develop non-preventive anti-phishing approaches. ...
doi:10.1109/acsac.2008.32
dblp:conf/acsac/YueW08
fatcat:fxo6hquwtrdrpa7yoxmmi3sctq
Authentication Mechanism for Resistance to Password Stealing and Reuse Attack
[article]
2014
arXiv
pre-print
., phishing, key logging and malwares). The purpose of this system is to introduce the concept and methodology which helps organization and users to implement stronger password policies. ...
TABLE I I System
Attack Prevention
Session hijacking
Phishing Key-logging
Password reuse
DNS spoofing
Malware
prevention
Our system
oPass [1]
MP-
Auth [4]
Phool
Proof [2]
Secure Web[3] ...
Compared with earlier methods, the user authentication protocol effectively prevents password stealing (i.e., phishing, key logger) and reuse attacks. ...
arXiv:1402.6497v1
fatcat:wodzqqmjfzfwrcvzmvumtqn35e
BogusBiter
2010
ACM Transactions on Internet Technology
Leveraging the power of client-side automatic phishing detection techniques, BogusBiter is complementary to existing preventive anti-phishing approaches. ...
However, usability studies have demonstrated that prevention-based approaches alone fail to effectively suppress phishing attacks and protect Internet users from revealing their credentials to phishing ...
Parno et al. [2006] proposed a Phoolproof anti-phishing mechanism. ...
doi:10.1145/1754393.1754395
fatcat:izxe5ydanjeghnbcqudx3sb5ly
CamAuth: Securing Web Authentication with Camera
2015
2015 IEEE 16th International Symposium on High Assurance Systems Engineering
In this paper, we present CamAuth, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter various password attacks including man-in-the-middle and phishing attacks ...
Both Phoolproof and MP-Auth require wireless connection and wellimplemented SSL/TLS. ...
Phoolproof [7] is a public-key based scheme for strengthening bank transaction system. ...
doi:10.1109/hase.2015.41
dblp:conf/hase/XieLYSB15
fatcat:ei4xilqqwbfcdjrrjhko6h2kze
Modeling Human Errors in Security Protocols
2016
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
For example, many people are fooled by phishing attacks into simply giving away their secret credentials. ...
A guideline that prevents the execution of the protocol leads therefore to a trivially satisfied authentication claim. ...
doi:10.1109/csf.2016.30
dblp:conf/csfw/BasinRS16
fatcat:sccvpgeovjekffsw7krq7iqaxa
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012
2012 IEEE Symposium on Security and Privacy
Mobile-Phone-based: Phoolproof Phoolproof Phishing Prevention [36] is another tokenbased design, but one in which the token is a mobile phone with special code and crypto keys. ...
Phoolproof was conceived as a system to secure banking transactions against phishing, not as a password replacement. ...
doi:10.1109/sp.2012.44
dblp:conf/sp/BonneauHOS12
fatcat:eywl5wtbw5ectmcr4dolfxnku4
« Previous
Showing results 1 — 15 out of 35 results