A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

J Clark, PC Van Oorschot - 2013 IEEE Symposium on Security …, 2013 - ieeexplore.ieee.org
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …

[PDF][PDF] A framework for reasoning about the human in the loop

LF Cranor - 2008 - usenix.org
Many secure systems rely on a “human in the loop” to perform security-critical functions.
However, humans often fail in their security roles. Whenever possible, secure system …

A survey on security visualization techniques for web information systems

T Khanh Dang, T Tri Dang - International Journal of Web Information …, 2013 - emerald.com
Purpose–By reviewing different information visualization techniques for securing web
information systems, this paper aims to provide a foundation for further studies of the same …

A systemic security and privacy review: Attacks and prevention mechanisms over IOT layers

MS Akhtar, T Feng - EAI Endorsed Transactions on Security and Safety, 2022 - eudl.eu
In this contemporary era internet of things are used in every realm of life. Recent software's
(eg, vehicle networking, smart grid, and wearable) are established in result of its use …

Compartmented security for browsers-or how to thwart a phisher with trusted computing

S Gajek, AR Sadeghi, C Stuble… - … Reliability and Security …, 2007 - ieeexplore.ieee.org
Identity theft through phishing attacks has become a major concern for Internet users.
Typically, phishing attacks aim at luring the user to a faked Web site to disclose personal …

Internet banking: Client-side attacks and protection mechanisms

R Oppliger, R Rytz, T Holderegger - Computer, 2009 - ieeexplore.ieee.org
Although current mechanisms protect against offline credential-stealing attacks, effective
protection against online channel-breaking attacks requires technologies to defeat man-in …

Above the trust and security in cloud computing: A notion towards innovation

M Ahmed, Y Xiang, S Ali - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
While the nascent Cloud Computing paradigm supported by virtualization has the upward
new notion of edges, it lacks proper security and trust mechanisms. Edges are like on …

Analysis and research on HTTPS hijacking attacks

K Cheng, M Gao, R Guo - 2010 Second International …, 2010 - ieeexplore.ieee.org
With the development of e-commerce, SSL protocol is more and more widely applied to
various network services. For the defect of SSL authentication, this paper analyses two kinds …

What do they" indicate?" Evaluating security and privacy indicators

LF Cranor - Interactions, 2006 - dl.acm.org
SPECIAL SECTION HCI & SECURITY of its mouth. I was surprised to discover during a user
study that some users, even after being told that the indicators were associated with a …