[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Marforio et al., 2016 - Google Patents

Hardened setup of personalized security indicators to counter phishing attacks in mobile banking

Marforio et al., 2016

View PDF
Document ID
6650130545104351232
Author
Marforio C
Masti R
Soriente C
Kostiainen K
Capkun S
Publication year
Publication venue
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices

External Links

Snippet

Application phishing attacks are rooted in users inability to distinguish legitimate applications from malicious ones. Previous work has shown that personalized security indicators can help users in detecting application phishing attacks in mobile platforms. A …
Continue reading at library.usc.edu.ph (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Similar Documents

Publication Publication Date Title
Focardi et al. Usable security for QR code
US11238139B2 (en) Methods for securely storing sensitive data on mobile device
Imgraben et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
Marforio et al. Hardened setup of personalized security indicators to counter phishing attacks in mobile banking
US8312520B2 (en) Methods and systems to detect attacks on internet transactions
US20190394168A1 (en) Using Individualized APIs to Block Automated Attacks on Native Apps and/or Purposely Exposed APIs wih Forced User Interaction
Marforio et al. Personalized security indicators to detect application phishing attacks in mobile platforms
KR20170129866A (en) Automated demonstration of device integrity using block chains
Ulqinaku et al. Is real-time phishing eliminated with {FIDO}? social engineering downgrade attacks against {FIDO} protocols
Kumar et al. Security analysis of unified payments interface and payment apps in India
Marforio et al. Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
Mannan et al. Leveraging personal devices for stronger password authentication from untrusted computers
Gallery et al. Trusted computing: Security and applications
US10826901B2 (en) Systems and method for cross-channel device binding
CN109740319B (en) Digital identity verification method and server
Li et al. Authenticator rebinding attack of the UAF protocol on mobile devices
CN109145543A (en) A kind of identity identifying method
Messaggi Kaya Trust and security risks in mobile banking
US20170206530A1 (en) Method and system for call authentication and providing reliability
Fonte Host card emulation with tokenisation: Security risk assessments
Fujita et al. Design and Implementation of a multi-factor web authentication system with MyNumberCard and WebUSB
Loutfi Trusted Execution on Commodity Devices
Hatunic-Webster Modelling Anti-Phishing Authentication Ceremonies
Machap et al. SafeBudget: Security enhanced application for budget tracking using cryptographic key exchange
da Fonte Host Card Emulation with Tokenisation: Security Risk Assessments