{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:48:12Z","timestamp":1773668892570,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372995","type":"print"},{"value":"9783642373008","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_11","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T08:53:59Z","timestamp":1363164839000},"page":"184-203","source":"Crossref","is-referenced-by-count":1,"title":["SmartProxy: Secure Smartphone-Assisted Login on Compromised Machines"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Hoffmann","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Uellenbeck","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"SPDY, \n                    \n                      http:\/\/www.chromium.org\/spdy\n                    \n                    \n                   (accessed November 04, 2011)"},{"key":"11_CR2","unstructured":"One, A.: Smashing the Stack for Fun and Profit. Phrack Magazine 49(14) (1996)"},{"key":"11_CR3","unstructured":"Balfanz, D., Felten, E.W.: Hand-Held Computers Can Be Better Smart Cards. In: USENIX Security Symposium (1999)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45866-2_10","volume-title":"Pervasive Computing","author":"D. Clarke","year":"2002","unstructured":"Clarke, D., Gassend, B., Kotwal, T., Burnside, M., van Dijk, M., Devadas, S., Rivest, R.: The Untrusted Computer Problem and Camera-Based Authentication. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol.\u00a02414, pp. 114\u2013124. Springer, Heidelberg (2002)"},{"key":"11_CR5","unstructured":"Drew, C., (The New York Times): Stolen Data Is Tracked to Hacking at Lockheed, \n                    \n                      http:\/\/www.nytimes.com\/2011\/06\/04\/technology\/04security.html\n                    \n                    \n                   (accessed November 04, 2011)"},{"key":"11_CR6","unstructured":"Chiasson, S., van Oorschot, P.C., Biddle, R.: A usability study and critique of two password managers. In: USENIX Security Symposium (2006)"},{"key":"11_CR7","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-29336-8_2","volume-title":"Mobile Computing, Applications, and Services","author":"B. Dodson","year":"2012","unstructured":"Dodson, B., Sengupta, D., Boneh, D., Lam, M.S.: Secure, Consumer-Friendly Web Authentication and Payments with a Phone. In: Gris, M., Yang, G. (eds.) MobiCASE 2010. LNICST, vol.\u00a076, pp. 17\u201338. Springer, Heidelberg (2012)"},{"key":"11_CR8","unstructured":"EMC Corporation. RSA SecurID, \n                    \n                      http:\/\/www.rsa.com\/node.aspx?id=1156\n                    \n                    \n                   (accessed November 04, 2011)"},{"key":"11_CR9","unstructured":"Franklin, J., Perrig, A., Paxson, V., Savage, S.: An inquiry into the nature and causes of the wealth of internet miscreants. In: ACM Conference on Computer and Communications Security, CCS (2007)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-63594-7_64","volume-title":"Financial Cryptography","author":"E. Gabber","year":"1997","unstructured":"Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol.\u00a01318, pp. 17\u201331. Springer, Heidelberg (1997)"},{"key":"11_CR11","unstructured":"gera: Advances in Format String Exploitation. Phrack Magazine 59(12) (2002)"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J.A. Halderman","year":"2009","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold-boot Attacks on Encryption Keys. Commun. ACM\u00a052, 91\u201398 (2009)","journal-title":"Commun. ACM"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Hallsteinsen, S., Jorstad, I., Van Thanh, D.: Using the mobile phone as a security token for unified authentication. In: Proceedings of the Second International Conference on Systems and Networks Communications, ICSNC (2007)","DOI":"10.1109\/ICSNC.2007.82"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-14623-7_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"W. Henecka","year":"2010","unstructured":"Henecka, W., May, A., Meurer, A.: Correcting Errors in RSA Private Keys. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 351\u2013369. Springer, Heidelberg (2010)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04444-1_1","volume-title":"Computer Security \u2013 ESORICS 2009","author":"T. Holz","year":"2009","unstructured":"Holz, T., Engelberth, M., Freiling, F.: Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 1\u201318. Springer, Heidelberg (2009)"},{"key":"11_CR16","unstructured":"Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: root kits for web. In: USENIX Workshop on Hot Topics in Security, HotSec (2007)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K.E., Venkasubramanian, N.: Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. In: Annual Computer Security Applications Conference, ACSAC (2006)","DOI":"10.1109\/ACSAC.2006.23"},{"key":"11_CR18","unstructured":"Kaliski, B.: PKCS #5: Password-Based Cryptography Specification Version 2.0 (2000), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc2898"},{"key":"11_CR19","unstructured":"Langley, A.: Transport Layer Security (TLS) Next Protocol Negotiation Extension (2010), \n                    \n                      https:\/\/tools.ietf.org\/html\/draft-agl-tls-nextprotoneg-00"},{"key":"11_CR20","unstructured":"Langley, A.: Transport Layer Security (TLS) Snap Start (2010), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-agl-tls-snapstart-00"},{"key":"11_CR21","unstructured":"Langley, A., Modadugu, N., Moeller, B.: Transport Layer Security (TLS) False Start (2010), \n                    \n                      https:\/\/tools.ietf.org\/html\/draft-bmoeller-tls-falsestart-00"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"M. Mannan","year":"2007","unstructured":"Mannan, M., van Oorschot, P.C.: Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol.\u00a04886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"key":"11_CR23","unstructured":"Nergal: The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 58(4) (2001)"},{"key":"11_CR24","unstructured":"Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: USENIX Security Symposium (2005)"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In: ACM Conference on Computer and Communications Security, CCS (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"11_CR26","unstructured":"Wu, M., Garfinkel, S., Miller, R.: Secure Web Authentication with Mobile Phones. In: DIMACS Workshop on Usable Privacy and Security Systems (2004)"},{"key":"11_CR27","unstructured":"Yubico. YubiKey - The key to the cloud, \n                    \n                      http:\/\/www.yubico.com\/products-250\n                    \n                    \n                   (accessed November 04, 2011)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:56:09Z","timestamp":1557600969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}