{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:26Z","timestamp":1725687146782},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_47","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"549-554","source":"Crossref","is-referenced-by-count":0,"title":["A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages"],"prefix":"10.1007","author":[{"given":"Marco","family":"Prandini","sequence":"first","affiliation":[]},{"given":"Marco","family":"Ramilli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1145\/1124772.1124861","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006)"},{"key":"47_CR2","unstructured":"Heffner, C.: How to hack millions of routers. In: Black Hat Conference 2010 (2010)"},{"key":"47_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-14215-4_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N. Nikiforakis","year":"2010","unstructured":"Nikiforakis, N., Younan, Y., Joosen, W.: HProxy: Client-Side Detection of SSL Stripping Attacks. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 200\u2013218. Springer, Heidelberg (2010), doi:10.1007\/978-3-642-14215-4_12"},{"key":"47_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2010.190","volume":"8","author":"M. Prandini","year":"2010","unstructured":"Prandini, M., Ramilli, M., Cerroni, W., Callegati, F.: Splitting the HTTPS stream to attack secure web connections. IEEE Security and Privacy\u00a08, 80\u201384 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"47_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-540-77048-0_38","volume-title":"Information and Communications Security","author":"S. Stamm","year":"2007","unstructured":"Stamm, S., Ramzan, Z., Jakobsson, M.: Drive-By Pharming. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 495\u2013506. Springer, Heidelberg (2007), 10.1007\/978-3-540-77048-0_38"},{"key":"47_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/964723.383071","volume":"31","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. SIGCOMM Comput. Commun. Rev.\u00a031, 149\u2013160 (2001)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"47_CR7","first-page":"399","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009","author":"J. Sunshine","year":"2009","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectiveness. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 399\u2013416. USENIX Association, Berkeley (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:46Z","timestamp":1620128386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_47","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}