Offenbar setzen Entwickler von Erpressungs-Trojanern auf eine neue Methode, um mit dieser Schädlingsart Geld zu verdienen.
Archiv der Kategorie: Technik_Beiträge
Internationale wissenschaftliche Beiträge aus Zeitschriften, Journalen oder WWW-Seiten.
1st TIPPI Workshop
1st TIPPI Workshop: Trustworthy Interfaces for Passwords and Personal Information, Stanford University, USA
Präsentationen des ersten Workshops, der sich auf die Problematik des Phishins und seinen Variationen konzentriert.
Anti-Spam & Anti-Phishing
Slides in PDF format for my talk in UCL’s seminar series. I covered the failure of universal proof-of-work systems to deliver, the success of ISP log processing (extrusion detection) and tacked on some remarks about tackling phishing.
The Homograph Attack
Inside Risks 140, CACM 45, 2, February 2002
Oldtimers remember slashes (/) through zeros [or through the letter O where there was no difference] in program listings to avoid confusing them with the letter O. This has long been obsoleted by advances in editing tools and font differentiation. However, the underlying problem of character resemblance remains, and has now emerged as a security problem.
Two-Factor Authentication: Too Little, Too Late
Inside Risks 178, CACM 48, 4, April, 2005
Two-factor authentication isn’t our savior. It won’t defend against phishing. It’s not going to prevent identity theft. It’s not going to secure online accounts from fraudulent transactions. It solves the security problems we had ten years ago, not the security problems we have today.
Stealth Attacks and Delayed Password Disclosure
A variety of computer networks are vulnerable to so-called stealth attacks. While there are many types of stealth attacks, they all have one thing in common (which is the very reason, of course, for their name) – the attackers are hard to detect. In some cases, it is even hard for a victim to determine that he was attacked – days or weeks may pass before this becomes evident. By then, it may be too late, as in the meantime, the attacker may collect and even modify information that was not intended for him. The attacks can be mounted against both wired and wireless networks, but the relative ease with which they can be used to attack users of wireless networks poses a particular threat within a variety of settings, including public hotspots. Moreover, stealth attacks pose a particular threat in the context of identity theft. A particular type of stealth attack we describe herein is the so-called “doppelganger window attack”. This can either be mounted in a similar fashion as the typical phishing attack is, but poses a greater threat than current phishing attacks. This is so since the doppelganger window attack defeats traditional methods for mutual authentication, which would otherwise have been a meaningful defense against phishing. We describe a new security technique, delayed password disclosure, that provides security against doppelganger window attacks. It can be based on any known method for mutual authentication, and its security can be proven to be the same as that of the underlying method – in addition to security against the doppelganger window attacks.