Phishing on Mobile Devices
暂无分享,去创建一个
[1] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[2] Hao Chen,et al. iPhish: Phishing Vulnerabilities on Consumer Electronics , 2008, UPSEC.
[3] Markus Jakobsson,et al. Implicit authentication for mobile devices , 2009 .
[4] David A. Wagner,et al. Conditioned-safe ceremonies and a user study of an application to web authentication , 2009, NDSS.
[5] Baptiste Gourdin. Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks , 2010, WOOT.
[6] Franco Callegati,et al. Splitting the HTTPS Stream to Attack Secure Web Connections , 2010, IEEE Security & Privacy.
[7] A. Porter. The Effectiveness of Install-Time Permission Systems for Third-Party Applications , 2010 .
[8] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.