{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:22Z","timestamp":1725558682808},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_18","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"204-216","source":"Crossref","is-referenced-by-count":22,"title":["Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures"],"prefix":"10.1007","author":[{"given":"Andre","family":"Adelsbach","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Gajek","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"Schwenk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Freier, A.O., Kariton, P., Kocher, P.C.: The SSL Protocol: Version 3.0. Internet draft, Netscape Communications (1996)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0. Internet Request for Comment RFC 2246, Internet Engineering Task Force, Proposed Standard (1999)","DOI":"10.17487\/rfc2246"},{"key":"18_CR3","volume-title":"Proceedings of the 2nd USENIX Workshop on Electronic Commerce","author":"B. Schneier","year":"1996","unstructured":"Schneier, B., Wagner, D.: Analysis of the SSL 3.0 protocol. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce. USENIX Press, Oakland (1996)"},{"key":"18_CR4","unstructured":"Ornaghi, A., Valleri, M.: Man in the middle attacks Demos. In: BlackHat Conference, USA (2003)"},{"key":"18_CR5","unstructured":"Felten, E.W., Balfanz, D., Dean, D., Wallach, D.S.: Web Spoofing: An Internet Con Game. In: Proceedings of the 20th National Information Systems Security Conference, Baltimore, USA (1997)"},{"key":"18_CR6","unstructured":"Zishuang Eileen Ye, Y.Y., Smith, S.: Web Spoofing Revisited: SSL and Beyond. Technical report tr2002-417, Dartmouth PKI Lab (2002)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Li, T.Y., Yongdong, W.: Trust on Web Browser: Attack vs. Defense. In: Proceedings of the International Conference on Applied Cryptography and Network Security, Kunming, China (2003)","DOI":"10.1007\/978-3-540-45203-4_19"},{"key":"18_CR8","unstructured":"Herzberg, A., Gbara, A.: Protecting (even) NaiveWeb Users, or: Preventing Spoofing and Establishing Credentials of Web Sites. Internet draft, Bar Ilan University, Computer Science Department (2004)"},{"key":"18_CR9","unstructured":"Anti Phishing Working Group: Phishing Attack Trend Report \u2013 (July 2004), http:\/\/www.antiphishing.org"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Litan, A.: Phishing Victims Likely Will Suffer Identity Theft Fraud. Gartner Research Note (May 14, 2004)","DOI":"10.1016\/S1361-3723(04)00055-7"},{"key":"18_CR11","unstructured":"Adelsbach, A., Gajek, S., Schwenk, J.: Visual spoofing toolbar (2004) http:\/\/www.nds.rub.de\/forschung\/gebiete\/UI\/VS\/download\/visualspoofingtoolbar.exe"},{"key":"18_CR12","unstructured":"Adelsbach, A., Gajek, S., Schwenk, J.: Visual Spoofing Demonstrator based on DHTML (2004), http:\/\/134.147.40.90 , Username:visual, Password:spoofing"},{"key":"18_CR13","unstructured":"Heise News Ticker: eBay konnte Passwortklau nicht verhindern (December 23, 2004), http:\/\/www.heise.de\/security\/news\/meldung\/print\/54605"},{"key":"18_CR14","unstructured":"Ye, Z.E., Smith, S.: Trusted Paths for Browsers. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, USA (2002)"},{"key":"18_CR15","unstructured":"Mozilla.org: weak XUL security allows chrome UI spoofing (phishing attack) bug.cgi?id=252198 (2004), https:\/\/bugzilla.mozilla.org\/show"},{"key":"18_CR16","volume-title":"Proceedings of the 2nd USENIX Workshop on Electronic Commerce","author":"J.D. Tygar","year":"1996","unstructured":"Tygar, J.D., Whitten, A.: WWW Electronic Commerce and Java Trojan Horses. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce. USENIX Press, Oakland (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:35Z","timestamp":1605760355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}