The death of the internet:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley [u.a.]
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 339 - 358 |
Beschreibung: | XXIV, 361 S. Ill., graph. Darst. |
ISBN: | 9781118062418 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040346742 | ||
003 | DE-604 | ||
005 | 20130220 | ||
007 | t | ||
008 | 120802s2012 xxuad|| |||| 00||| eng d | ||
010 | |a 2011047198 | ||
020 | |a 9781118062418 |c pbk. |9 978-1-11-806241-8 | ||
035 | |a (OCoLC)809190213 | ||
035 | |a (DE-599)BVBBV040346742 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-20 |a DE-473 |a DE-521 | ||
050 | 0 | |a TK5105.875.I57 | |
082 | 0 | |a 005.8 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
245 | 1 | 0 | |a The death of the internet |c ed. by Markus Jakobsson |
264 | 1 | |a Hoboken, NJ |b Wiley [u.a.] |c 2012 | |
300 | |a XXIV, 361 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 339 - 358 | ||
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Electronic commerce |x Security measures | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer crimes | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jakobsson, Markus |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025200882&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025200882 |
Datensatz im Suchindex
_version_ | 1804149382548815872 |
---|---|
adam_text | Contents
Foreword
xv
Preface
xvii
Is the Title of this Book a Joke?
xix
Acknowledgments
xxi
Contributors
xxiii
Parti TheProblem
1
What Could Kill the Internet? And so What?
3
2
It is About People
7
2.1
Human and Social Issues
7
Markus
Jakobsson
2.1.1
Nigerian Scams
8
2.1.2
Password Reuse
9
2.1.3
Phishing
11
2.2
Who are the Criminals?
13
Igor Bulavko
2.2.1
Who are they?
13
2.2.2
Where are they?
14
2.2.3
Deep-Dive: Taking a Look at Ex-Soviet Hackers
14
2.2.4
Let s try to Find Parallels in the World we Live in
16
2.2.5
Crime and Punishment?
16
3
How Criminals Profit
19
3.1
Online Advertising Fraud
20
Nevena
Vratonjic, Mohammad
Hossein
Manshaei, and Jean-Pierre Hubaux
3.1.1
Advertising on the Internet
20
3.1.2
Exploits of Online Advertising Systems
23
vii
viii Contents
3.1.3
Click Fraud
3.1.4
Malvertising: Spreading
Malware
via Ads
3.1.5
Inflight Modification of Ad Traffic
3.1.6
Adware: Unsolicited Software Ads
3.1.7
Conclusion
3.2
Toeing the Line: Legal but Deceptive Service Offers
Markus
Jakobsson
and Ruilin
Zhu
4.2.2
The Multitude of Web Browser Security Mechanisms
4.2.3
Where do we go from Here?
25
31
32
34
35
35
3.2.1
How Does it Work? 36
3.2.2
What do they Earn? 36
3.3
Phishing and Some Related Attacks
Markus Jakobsson
and William Leddy
3.3.1
The Problem is the User
**
3.3.2
Phishing
3.3.3
Man-in-the-Middle
40
3.3.4
Man-in-the-Browser
3.3.5
New Attack: Man-in-the-Screen
42
3.4 Malware:
Current Outlook
Members of the BITS Security Working Group and staff leads Greg Rattray
and Andrew Kennedy
42
3.4.1 Malware
Evolution
3.4.2 Malware
Supply and Demand
3.5
Monetization
Markus
Jakobsson
3.5.1
There is Money Everywhere
4
How Things Work and Fail
__________________________________________-________—
—- - >------------------------.-------------------------- - -
^ -g
4.1
Online Advertising: With Secret Security
Markus Jakobsson
4.1.1
What is a Click? 5jj
4.1.2
How Secret Filters are Evaluated
4.1.3
What do Fraudsters Know?
¿1
4.2
Web Security Remediation Efforts
Jeff Hodges and Andy Steingruebl
4.2.1
Introduction
64
75
4.3
Content-Sniffing XSS Attacks: XSS with Non-HTML Content 7
Juan Caballero, Adam Barth,
and Dawn Song
4.3.1
Introduction
4.3.2
Content-Sniffing XSS Attacks
Contents ix
4.3.3
Defenses
84
4.3.4
Conclusion
89
4.4
Our Internet Infrastructure at Risk
89
Garth Bruen
4.4.1
Introduction
89
4.4.2
The Political Structure
90
4.4.3
The Domain
92
4.4.4
WHOIS: Ownership and Technical Records
94
4.4.5
Registrars: Sponsors of Domain Names
96
4.4.6
Registries: Sponsors of Domain Extensions
97
4.4.7
CCTLDs: The Sovereign Domain Extensions
99
4.4.8
ICANN: The Main Internet Policy Body
100
4.4.9
Conclusion
102
4.5
Social Spam
103
Dimitar Nikolov and
Filippo
Menczer
4.5.1
Introduction
103
4.5.2
Motivations for Spammers
105
4.5.3
Case Study: Spam in the GiveALink Bookmarking System
108
4.5.4
Web Pollution
114
4.5.5
The Changing Nature of Social Spam: Content Farms
116
4.5.6
Conclusion
117
4.6
Understanding CAPTCHAs and Their Weaknesses
117
Elie
Bursztein
4.6.1
What is a Captcha?
117
4.6.2
Types of Captchas
118
4.6.3
Evaluating Captcha Attack Effectiveness
118
4.6.4
Design of Captchas
119
4.6.5
Automated Attacks
124
4.6.6
Crowd-Sourcing: Using Humans to Break Captchas
127
4.7
Security Questions
131
Ariel Rabkin
АЛЛ
Overview
131
4.7.2
Vulnerabilities
134
4.7.3
Variants and Possible Defenses
138
4.7.4
Conclusion
139
4.8
Folk Models of Home Computer Security
140
Rick Wash and Emilee
Rader
4.8.1
The Relationship Between Folk Models and Security
140
4.8.2
Folk Models of Viruses and Other
Malware 142
4.8.3
Folk Models of Hackers and Break-Ins
146
4.8.4
Following Security Advice
149
4.8.5
Lessons Learned
153
X
Contents
4.9
Detecting and Defeating
Interception
Attacks Against SSL
154
Christopher Soghoian and Sid
Stamm
4.9.1
Introduction 154
4.9.2
Certificate Authorities and the Browser Vendors 155
4.9.3
Big Brother in the Browser 157
4.9.4
Compelled Assistance 158
4.9.5
Surveillance Appliances 159
4.9.6
Protecting Users 160
4.9.7
Threat Model Analysis 163
4.9.8
Related Work 166
4.9.9
Conclusion 168
5
The Mobile Problem
________________________
_^____
_________________________—
5.1
Phishing on Mobile Devices 169
Adrienne
Porter Felt and David Wagner
5.1.1
The Mobile Phishing Threat 170
5.1.2
Common Control Transfers 172
5.1.3
Phishing Attacks 178
5.1.4
Web Sender
=>
Mobile Target 182
5.1.5
Web Sender
=>·
Web Target 184
5.1.6
Attack Prevention 185
5.2
Why Mobile
Malware will
Explode
85
Markus
Jakobsson
and Mark Grandcolas
5.2.1
Nineteen Eighty-Six: When it all Started 186
5.2.2
A Glimpse of Users 186
5.2.3
Why Market Size Matters 186
5.2.4
Financial Trends 187
5.2.5
Mobile
Malware
Outlook
Ш
5.3
Tapjacking: Stealing Clicks on Mobile Devices
Gustav
Rydstedt,
Baptiste Gourdin,
Elie
Bursztein, and Dan Boneh
5.3.1
Framing Attacks l89
5.3.2
Phone Tapjacking 191
5.3.3
Framing Facebook
5.3.4
Summary and Recommendations
6
The Internet and the Physical World
___
197
6.1
Malware-Enabled Wireless Tracking Networks
Nathaniel Husted and Steven Myers
6.1.1
Introduction 198
199
6.1.2
The Anatomy of a Modern Smartphone
Contents xi
6.1.3 Mobile
Tracking
Networks:
A Threat to Smartphones
200
6.1.4
Conclusion
219
6.2
Social Networking Leaks
219
Mayánk Dhiman
and
Markus
Jakobsson
6.2.1
Introduction
220
6.2.2
Motivations for Using Social Networking Sites
220
6.2.3
Trust and Privacy
221
6.2.4
Known Issues
222
6.2.5
Case Study: Social Networking Leaks in the Physical World
225
6.3
Abuse of Social Media and Political Manipulation
231
Bruno
Gonçalves,
Michael Conover, and
Filippo Menczer
6.3.1
The Rise of Online Grassroots Political Movements
231
6.3.2
Spam and Astroturfing
232
6.3.3
Deceptive Tactics
233
6.3.4
The Trathy System for Astroturf Detection
236
6.3.5
Discussion
240
Partii
Thinking About Solutions
7
Solutions to the Problem
245
7.1
When and How to Authenticate
245
Richard Chow, Elaine Shi,
Markus Jakobsson,
Philippe Golle,
Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song
7.1.1
Problem Description
246
7.1.2
Use Cases
247
7.1.3
System Architecture
248
7.1.4
User Privacy
250
7.1.5
Machine Learning/Algorithms
250
7.1.6
User Study
252
7.2
Fastwords: Adapting Passwords to Constrained Keyboards
255
Markus Jakobsson
and
Ruj Akavipat
7.2.1
The Principles Behind Fastwords
256
7.2.2
Basic Feature Set
258
7.2.3
Extended Feature Set
260
7.2.4
Sample Stories and Frequencies
261
7.2.5
Recall Rates
262
7.2.6
Security Analysis
264
7.2.7
The Security of Passwords
264
7.2.8
Entry Speed
268
7.2.9
Implementation of
Fastword
Entry
270
7.2.10
Conclusion
271
xii Contents
7.3
Deriving
PINs
from Passwords 271
Markus
Jakobsson
and Debin Liu
7.3.1
Introduction 272
7.3.2
A Brief Discussion of Passwords 273
7.3.3
How to Derive PINs from Passwords 274
7.3.4
Analysis of Passwords and Derived PINs 275
7.3.5
Security Analysis 278
7.3.6
Usability Experiments 28°
7.4
Visual Preference Authentication 282
Yuan
Ми,
Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir
7.4.1
Password
Resets 282
7.4.2
Security Questions Aren t so Secure 283
7.4.3
What is Visual Preference-Based Authentication 283
7.4.4
Evaluating Visual Preference-Based Authentication
285
7.4.5
Case Study: Visual Blue Moon Authentication 28f>
7.4.6
Conclusion 290
7.5
The Deadly Sins of Security User Interfaces 290
Nathan Good
7.5.1
Security Applications with Frustrating User Interfaces 291
7.5.2
The Four Sins of Security Application User Interfaces 293
7.5.3
Consumer Choice: A Security Bugbear
293
7.5.4
Security by Verbosity 2
7.5.5
Walls of Checkboxes
300
7.5.6
All or Nothing Switch 3O2
7.5.7
Conclusion 304
7.6
SpoofKiller—Let s Kiss Spoofing Goodbye! 304
Markus Jakobsson
and William Leddy
7.6.1
A Key to the Solution: Interrupts 3O5
7.6.2
Why can the User Log in to Good Sites, but not Bad Ones? 3O5
7.6.3
What About Sites that are Good
...
but not Certified Good? 308
7.6.4
SpoofKiller: Under the Hood 3O9
7.6.5
Say we Implement SpoofKiller—then What? 3
11
7.7
Device Identification and Intelligence 312
Ori
Eisen
7.7.1 1995-2001:
The Early Years of Device Identification
7.7.2 2001-2008
Tagless Device Identification Begins
7.7.3 2008—
Present: Private Browsing and Beyond
7.8
How can we Determine if a Device is Infected or not?
Aurélien Francillon,
Markus
Jakobsson,
and Adrian Perrig
7.8.1
Why Detection is Difficult
7.8.2
Setting up an Isolated Environment
7.8.3
What Could go Wrong?
Contents xiii
7.8.4 Brief
Comparison with TrustZone
328
7.8.5
Summary
328
8
The Future
331
8.1
Security Needs the Best User Experience
332
Hampus Jakobsson
How the User Won Over Features
332
So How Come the iPhone Became so Successful?
332
A World of Information Anywhere
333
Midas Touch Screens
334
New Input, New Opportunities
335
Zero-Click and Real-Life User Interfaces
335
Privacy and User Interfaces
336
It all Comes Together
336
8.2
Fraud and the Future
336
Markus Jakobsson
References
339
Index
359
8.
1.1
8.
1.2
8.
1.3
8.
1.4
8.
1.5
8.
1.6
8.
1.7
8.
1.8
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040346742 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 |
callnumber-search | TK5105.875.I57 |
callnumber-sort | TK 45105.875 I57 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 205 |
ctrlnum | (OCoLC)809190213 (DE-599)BVBBV040346742 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01661nam a2200457zc 4500</leader><controlfield tag="001">BV040346742</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130220 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120802s2012 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2011047198</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118062418</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-11-806241-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)809190213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040346742</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-521</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The death of the internet</subfield><subfield code="c">ed. by Markus Jakobsson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley [u.a.]</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 361 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 339 - 358</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jakobsson, Markus</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025200882&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025200882</subfield></datafield></record></collection> |
id | DE-604.BV040346742 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:22:09Z |
institution | BVB |
isbn | 9781118062418 |
language | English |
lccn | 2011047198 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025200882 |
oclc_num | 809190213 |
open_access_boolean | |
owner | DE-20 DE-473 DE-BY-UBG DE-521 |
owner_facet | DE-20 DE-473 DE-BY-UBG DE-521 |
physical | XXIV, 361 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Wiley [u.a.] |
record_format | marc |
spelling | The death of the internet ed. by Markus Jakobsson Hoboken, NJ Wiley [u.a.] 2012 XXIV, 361 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturverz. S. 339 - 358 Internet Security measures Electronic commerce Security measures Data protection Computer crimes COMPUTERS / Security / General bisacsh Internet (DE-588)4308416-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s DE-604 Jakobsson, Markus Sonstige oth Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025200882&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | The death of the internet Internet Security measures Electronic commerce Security measures Data protection Computer crimes COMPUTERS / Security / General bisacsh Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4011144-1 |
title | The death of the internet |
title_auth | The death of the internet |
title_exact_search | The death of the internet |
title_full | The death of the internet ed. by Markus Jakobsson |
title_fullStr | The death of the internet ed. by Markus Jakobsson |
title_full_unstemmed | The death of the internet ed. by Markus Jakobsson |
title_short | The death of the internet |
title_sort | the death of the internet |
topic | Internet Security measures Electronic commerce Security measures Data protection Computer crimes COMPUTERS / Security / General bisacsh Internet (DE-588)4308416-3 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Internet Security measures Electronic commerce Security measures Data protection Computer crimes COMPUTERS / Security / General Internet Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025200882&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jakobssonmarkus thedeathoftheinternet |