Van Goethem et al., 2014 - Google Patents
Clubbing seals: Exploring the ecosystem of third-party security sealsVan Goethem et al., 2014
View PDF- Document ID
- 5743886027554976071
- Author
- Van Goethem T
- Piessens F
- Joosen W
- Nikiforakis N
- Publication year
- Publication venue
- Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
In the current web of distrust, malware, and server compromises, convincing an online consumer that a website is secure, can make the difference between a visitor and a buyer. Third-party security seals position themselves as a solution to this problem, where a trusted …
- 206010009691 Clubbing 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kharraz et al. | Surveylance: Automatically detecting online survey scams | |
Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
Wang et al. | Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services | |
Senol et al. | Leaky forms: A study of email and password exfiltration before form submission | |
Kapravelos et al. | Hulk: Eliciting malicious behavior in browser extensions | |
Lekies et al. | The Unexpected Dangers of Dynamic {JavaScript} | |
Nikiforakis et al. | You are what you include: large-scale evaluation of remote javascript inclusions | |
US20150052005A1 (en) | Internet site authentication with payments authorization data | |
Huber et al. | Appinspect: large-scale evaluation of social networking apps | |
Zhang et al. | All your clicks belong to me: investigating click interception on the web | |
Rains | Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization | |
Durey et al. | FP-Redemption: Studying browser fingerprinting adoption for the sake of web security | |
US9972013B2 (en) | Internet site authentication with payments authorization data | |
Toreini et al. | DOMtegrity: ensuring web page integrity against malicious browser extensions | |
Van Goethem et al. | Clubbing seals: Exploring the ecosystem of third-party security seals | |
Chughtai et al. | Deep learning trends and future perspectives of web security and vulnerabilities | |
Zaeifi et al. | Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
Bower et al. | Identifying javascript skimmers on high-value websites | |
Missaoui et al. | Who is reusing stolen passwords? An empirical study on stolen passwords and countermeasures | |
Garcia et al. | The commonalities in social engineering attacks through e-commerce shopping platforms & online gaming programs | |
Durey | Leveraging browser fingerprinting to strengthen web authentication | |
Day et al. | Reinterpreting the disclosure debate for web infections | |
Acar | Online Tracking Technologies and Web Privacy | |
Izagirre | Deception strategies for web application security: application-layer approaches and a testing platform |