Marforio et al., 2016 - Google Patents
Hardened setup of personalized security indicators to counter phishing attacks in mobile bankingMarforio et al., 2016
View PDF- Document ID
- 6650130545104351232
- Author
- Marforio C
- Masti R
- Soriente C
- Kostiainen K
- Capkun S
- Publication year
- Publication venue
- Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices
External Links
Snippet
Application phishing attacks are rooted in users inability to distinguish legitimate applications from malicious ones. Previous work has shown that personalized security indicators can help users in detecting application phishing attacks in mobile platforms. A …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Focardi et al. | Usable security for QR code | |
US11238139B2 (en) | Methods for securely storing sensitive data on mobile device | |
Imgraben et al. | Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users | |
Marforio et al. | Hardened setup of personalized security indicators to counter phishing attacks in mobile banking | |
US8312520B2 (en) | Methods and systems to detect attacks on internet transactions | |
US20190394168A1 (en) | Using Individualized APIs to Block Automated Attacks on Native Apps and/or Purposely Exposed APIs wih Forced User Interaction | |
Marforio et al. | Personalized security indicators to detect application phishing attacks in mobile platforms | |
KR20170129866A (en) | Automated demonstration of device integrity using block chains | |
Ulqinaku et al. | Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols | |
Kumar et al. | Security analysis of unified payments interface and payment apps in India | |
Marforio et al. | Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications | |
Mannan et al. | Leveraging personal devices for stronger password authentication from untrusted computers | |
Gallery et al. | Trusted computing: Security and applications | |
US10826901B2 (en) | Systems and method for cross-channel device binding | |
CN109740319B (en) | Digital identity verification method and server | |
Li et al. | Authenticator rebinding attack of the UAF protocol on mobile devices | |
CN109145543A (en) | A kind of identity identifying method | |
Messaggi Kaya | Trust and security risks in mobile banking | |
US20170206530A1 (en) | Method and system for call authentication and providing reliability | |
Fonte | Host card emulation with tokenisation: Security risk assessments | |
Fujita et al. | Design and Implementation of a multi-factor web authentication system with MyNumberCard and WebUSB | |
Loutfi | Trusted Execution on Commodity Devices | |
Hatunic-Webster | Modelling Anti-Phishing Authentication Ceremonies | |
Machap et al. | SafeBudget: Security enhanced application for budget tracking using cryptographic key exchange | |
da Fonte | Host Card Emulation with Tokenisation: Security Risk Assessments |