完整後設資料紀錄
DC 欄位語言
dc.contributor.authorWu, Yongdong
dc.contributor.authorSheng, Xu Chang
dc.contributor.authorMa Di
dc.date.accessioned2009-08-23T04:41:46Z
dc.date.accessioned2020-05-25T06:41:25Z-
dc.date.available2009-08-23T04:41:46Z
dc.date.available2020-05-25T06:41:25Z-
dc.date.issued2006-10-16T03:29:00Z
dc.date.submitted2002-12-18
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1421-
dc.description.abstractThis paper presents an attack which spoofs a browser in the client’s machine. When a client visits the attacker’s site, or the attacker hijacks a connection, a malicious HTML file will be downloaded to the client’s machine. This file instructs to create a spoofing browser including a faked window and event processing methods. The bogus window, having the same appearance as the original browser window, shows the web content of the target site. But the bogus methods provide malicious activities besides the genuine one. From the viewpoint of the client, the browser is still trustworthy although it is at the fully control of the attacker. This spoofed browser can cheat the client even a “secure” connection is built. We design a simple system to demonstrate the attack.
dc.description.sponsorship東華大學,花蓮縣
dc.format.extent10p.
dc.format.extent220992 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2002 ICS會議
dc.subjectWeb Security
dc.subjectDynamic HTML
dc.subject.otherCryptology and Information Security
dc.titleBrowser Spoofing
分類:2002年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002002000204.PDF215.81 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。