Spyware Resistant Web Authentication using Virtual Machines

The shell of a sheet metal door is formed of two opposed wide, shallow trough-like members each having opposed edge layers folded back upon one another to provide greater thicknesses of metal at the edges than at the panels.

[1]  Steven D. Gribble,et al.  A Crawler-based Study of Spyware in the Web , 2006, NDSS.

[2]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[3]  Rob Pike,et al.  Security in Plan 9 , 2002, USENIX Security Symposium.

[4]  Yossi Matias,et al.  How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.

[5]  John C. Mitchell,et al.  Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.

[6]  Sarvar Patel,et al.  Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.

[7]  Sean W. Smith,et al.  PorKI: making user PKI safe on machines of heterogeneous trustworthiness , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[8]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[9]  Rafail Ostrovsky,et al.  Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.

[10]  David P. Jablon Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[11]  Yehuda Lindell,et al.  A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.

[12]  Thomas D. Wu The Secure Remote Password Protocol , 1998, NDSS.

[13]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[14]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[15]  David P. Jablon Strong password-only authenticated key exchange , 1996, CCRV.

[16]  Brent Waters,et al.  A convenient method for securely managing passwords , 2005, WWW '05.

[17]  Dan Boneh,et al.  Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.

[18]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.