Phishing on Mobile Devices, p.2, 2011. ,
Touchjacking Attacks on Web in Android, iOS, and Windows Phone, Foundations and Practice of Security, 2012. ,
DOI : 10.1007/978-3-642-37119-6_15
Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks, In: wOOt, 2010. ,
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests, In: ESSoS, 2010. ,
SessionJuggler, Proceedings of the 21st international conference on World Wide Web, WWW '12, 2012. ,
DOI : 10.1145/2187836.2187880
How to Ask for Permission, In: HotSec, 2012. ,
Client-side Defense against Web-Based Identity Theft, p.4, 2004. ,
The battle against phishing, Proceedings of the 2005 symposium on Usable privacy and security , SOUPS '05, 2005. ,
DOI : 10.1145/1073001.1073009
Preventing Cross Site Request Forgery Attacks, 2006 Securecomm and Workshops, 2006. ,
DOI : 10.1109/SECCOMW.2006.359531
Content Security Policy, W3C Working Draft, p.20111129, 2011. ,
Reliable protection against session fixation attacks, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, 2011. ,
DOI : 10.1145/1982185.1982511
SAML V2.0. https://www.oasis-open, 2008. ,
GuarDroid: A Trusted Path for Password Entry, p.2013, 2013. ,
A User-Level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities, 2012. ,
DOI : 10.1007/978-3-642-32287-7_2