WWW electronic commerce and java trojan horses

作者: Alma Whitten , J. D. Tygar

DOI:

关键词:

摘要: World Wide Web electronic commerce applications often require consumers to enter private information (such as credit card numbers) into forms in the browser window. If third parties can insert trojan horse onto a consumer's machine, they monitor keyboard strokes and steal information. This paper outlines simple way accomplish this using Java or similar remote execution facilities. We implemented version of attack. give general method, window personalization, that thwart prevent

参考文章(13)
J. D. Tygar, Benjamin Cox, Marvin Sirbu, NetBill security and transaction protocol WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1. pp. 6- 6 ,(1995)
Howard Gobioff, Bennet Yee, Sean Smith, J. D. Tygar, Smart cards in hostile environments WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 3- 3 ,(1996)
Ali-Reza Adl-Tabatabai, Geoff Langdale, Steven Lucco, Robert Wahbe, Efficient and language-independent mobile programs Proceedings of the ACM SIGPLAN 1996 conference on Programming language design and implementation - PLDI '96. ,vol. 31, pp. 127- 136 ,(1996) , 10.1145/231379.231402
E.W. Felten, D. Dean, D.S. Wallach, Java security: from HotJava to Netscape and beyond ieee symposium on security and privacy. pp. 190- 200 ,(1996) , 10.5555/525080.884266
Bennet Yee, J. D. Tygar, Secure coprocessors in electronic commerce applications WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1. pp. 14- 14 ,(1995)
M. Sirbu, J.D. Tygar, NetBill: an Internet commerce system optimized for network-delivered services IEEE Personal Communications. ,vol. 2, pp. 34- 39 ,(1995) , 10.1109/98.403456
Ken Thompson, Reflections on trusting trust Rogue programs: viruses, worms and Trojan horses. pp. 121- 127 ,(1990)
Darren New, Internet information commerce: the first virtual (TM) approach WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1. pp. 4- 4 ,(1995)
Adrian R. D. Norman, Computer Insecurity ,(1983)