完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Wu, Yongdong | |
dc.contributor.author | Sheng, Xu Chang | |
dc.contributor.author | Ma Di | |
dc.date.accessioned | 2009-08-23T04:41:46Z | |
dc.date.accessioned | 2020-05-25T06:41:25Z | - |
dc.date.available | 2009-08-23T04:41:46Z | |
dc.date.available | 2020-05-25T06:41:25Z | - |
dc.date.issued | 2006-10-16T03:29:00Z | |
dc.date.submitted | 2002-12-18 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/1421 | - |
dc.description.abstract | This paper presents an attack which spoofs a browser in the client’s machine. When a client visits the attacker’s site, or the attacker hijacks a connection, a malicious HTML file will be downloaded to the client’s machine. This file instructs to create a spoofing browser including a faked window and event processing methods. The bogus window, having the same appearance as the original browser window, shows the web content of the target site. But the bogus methods provide malicious activities besides the genuine one. From the viewpoint of the client, the browser is still trustworthy although it is at the fully control of the attacker. This spoofed browser can cheat the client even a “secure” connection is built. We design a simple system to demonstrate the attack. | |
dc.description.sponsorship | 東華大學,花蓮縣 | |
dc.format.extent | 10p. | |
dc.format.extent | 220992 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 2002 ICS會議 | |
dc.subject | Web Security | |
dc.subject | Dynamic HTML | |
dc.subject.other | Cryptology and Information Security | |
dc.title | Browser Spoofing | |
分類: | 2002年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002002000204.PDF | 215.81 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。