R. Dhamija, J. D. Tygar, and M. Hearst, Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.581-590, 2006.
DOI : 10.1145/1124772.1124861

C. Heffner, How to hack millions of routers, 2010.

N. Nikiforakis, Y. Younan, and W. Joosen, HProxy: Client-Side Detection of SSL Stripping Attacks, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.200-218978, 1007.
DOI : 10.1007/978-3-642-14215-4_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.319

M. Prandini, M. Ramilli, W. Cerroni, and F. Callegati, Splitting the HTTPS Stream to Attack Secure Web Connections, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.80-84, 2010.
DOI : 10.1109/MSP.2010.190

S. Stamm, Z. Ramzan, and M. Jakobsson, Drive-By Pharming, Information and Communications Security, pp.495-506, 2007.
DOI : 10.1007/978-3-540-77048-0_38

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001.
DOI : 10.1145/964723.383071

J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, Crying wolf: an empirical study of ssl warning effectiveness, Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pp.399-416, 2009.