[go: up one dir, main page]

Van Goethem et al., 2014 - Google Patents

Clubbing seals: Exploring the ecosystem of third-party security seals

Van Goethem et al., 2014

View PDF
Document ID
5743886027554976071
Author
Van Goethem T
Piessens F
Joosen W
Nikiforakis N
Publication year
Publication venue
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

In the current web of distrust, malware, and server compromises, convincing an online consumer that a website is secure, can make the difference between a visitor and a buyer. Third-party security seals position themselves as a solution to this problem, where a trusted …
Continue reading at lirias.kuleuven.be (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Kharraz et al. Surveylance: Automatically detecting online survey scams
Nagpure et al. Vulnerability assessment and penetration testing of web application
Wang et al. Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
Senol et al. Leaky forms: A study of email and password exfiltration before form submission
Kapravelos et al. Hulk: Eliciting malicious behavior in browser extensions
Lekies et al. The Unexpected Dangers of Dynamic {JavaScript}
Nikiforakis et al. You are what you include: large-scale evaluation of remote javascript inclusions
US20150052005A1 (en) Internet site authentication with payments authorization data
Huber et al. Appinspect: large-scale evaluation of social networking apps
Zhang et al. All your clicks belong to me: investigating click interception on the web
Rains Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization
Durey et al. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security
US9972013B2 (en) Internet site authentication with payments authorization data
Toreini et al. DOMtegrity: ensuring web page integrity against malicious browser extensions
Van Goethem et al. Clubbing seals: Exploring the ecosystem of third-party security seals
Chughtai et al. Deep learning trends and future perspectives of web security and vulnerabilities
Zaeifi et al. Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
Varshney et al. Detecting spying and fraud browser extensions: Short paper
Bower et al. Identifying javascript skimmers on high-value websites
Missaoui et al. Who is reusing stolen passwords? An empirical study on stolen passwords and countermeasures
Garcia et al. The commonalities in social engineering attacks through e-commerce shopping platforms & online gaming programs
Durey Leveraging browser fingerprinting to strengthen web authentication
Day et al. Reinterpreting the disclosure debate for web infections
Acar Online Tracking Technologies and Web Privacy
Izagirre Deception strategies for web application security: application-layer approaches and a testing platform