The death of the Internet / edited by Markus Jakobsson.
| Other author | Jakobsson, Markus. |
| Format | Book |
| Publication | Hoboken, New Jersey : IEEE Press ; [Los Alamitos, Calif.] : Computer Society ; Hoboken, New Jersey : Wiley ; [Beiging] : Higher Education Press, [2012] |
| Copyright Date | ©2012 |
| Description | xxiv, 361 pages : illustrations ; 24 cm |
| Subjects |
| Contents | pt. I. The problem. 1. What could kill the Internet? And so what? -- 2. It is about people. Human and social issues / Markus Jakobsson : Nigerian scams ; Password reuse ; Phishing -- Who are the criminals? / Igor Bulavko : Who are they? ; Where are they? ; Deep-dive: taking a look at ex-Soviet hackers ; Let's try to find parallels in the world we live in ; Crime and punishment? -- 3. How criminals profit. Online advertising fraud / Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux : Advertising on the Internet ; Exploits of online advertising systems ; Click fraud ; Malvertising: spreading malware via ads ; Inflight modification of ad traffic ; Adware: unsolicited software ads -- Toeing the line: legal but deceptive service offers / Markus Jakobsson and Ruilin Zhu : How does it work? ; What do they earn? -- Phishing and some related attacks / Markus Jakobsson and William Leddy : The problem is the user ; Phishing ; Man-in-the-middle ; Man-in-the-browser ; New attack: man-in-the-screen -- Malware: current outlook / Members of the BITS Security Working Group and staff leads Greg Rattray and Andrew Kennedy : Malware evolution ; Malware supply and demand -- Monetization / Markus Jakobsson : There is money everywhere -- 4. How things work and fail. Online advertising: with secret security / Markus Jakobsson : What is a click? ; How secret filters are evaluated ; What do fraudsters know? -- Web security remediation efforts / Jeff Hodges and Andy Steingruebl : The multitude of web browser security mechanisms ; Where do we go from here? -- Content-sniffing XSS attacks: XSS with non-HTML content / Juan Caballero, Adam Barth, and Dawn Song : Content-sniffing XSS attacks ; Defenses -- Our Internet infrastructure at risk / Garth Bruen : The political structure ; The domain ; WHOIS: ownership and technical records ; Registrars: sponsors of domain names ; Registries: Sponsors of domain extensions ; CCTLDs: the sovereign domain extensions ; ICANN: the main Internet policy body -- Social spam / Dimitar Nikolov and Filippo Menczer : Motivations for spammers ; Case study: Spam in the GiveALink bookmarking system ; Web pollution ; The changing nature of social spam: content farms -- Understanding CAPTCHAs and their weaknesses / Elie Bursztein : What is a captcha? ; Types of captchas ; Evaluating captcha attack effectiveness ; Design of captchas ; Automated attacks ; Crowd-sourcing: using humans to break captchas -- Security questions / Ariel Rabkin : Vulnerabilities ; Variants and possible defenses -- Folk models of home computer security / Rick Wash and Emilee Rader : The relationship between folk models and security ; Folk models of viruses and other malware ; Folk models of hackers and break-ins ; Following security advice ; Lessons learned -- Detecting and defeating interception attacks against SSL / Christopher Soghoian and Sid Stamm : Certificate authorities and the browser vendors ; Big Brother in the browser ; Compelled assistance ; Surveillance appliances ; Protecting users ; Threat model analysis ; Related work -- 5. The mobile problem. Phishing on mobile devices / Adrienne Porter Felt and David Wagner : The mobile phishing threat ; Common control transfers ; Phishing attacks ; Web sender [arrow] mobile target ; Web sender [arrow] web target ; Attack prevention -- Why mobile malware will explode / Markus Jakobsson and Mark Grandcolas : Nineteen eighty-six: when it all started ; A glimpse of users ; Why market size matters ; Financial trends ; Mobile malware outlook -- Tapjacking: stealing clicks on mobile devices / Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh : Framing attacks ; Phone tapjacking ; Framing Facebook ; Summary and recommendations -- 6. The Internet and the physical world. Malware-enabled wireless tracking networks / Nathaniel Husted and Steven Myers : The anatomy of a modern smartphone ; Mobile tracking networks: a threat to smartphones -- Social networking leaks / Mayank Dhiman and Markus Jakobsson : Motivations for using social networking sites ; Trust and privacy ; Known issues ; Case study: Social networking leaks in the physical world -- Abuse of social media and political manipulation / Bruno Gonç̐alves, Michael Conover, and Filippo Menczer : The rise of online grassroots political movements ; Spam and astroturfing ; Deceptive tactics ; The truthy system for astroturf detection --. |
| Contents | pt. II. Thinking about solutions. 7. Solutions to the problem. When and how to authenticate / Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song : Problem description ; Use cases ; System architecture ; User privacy ; Machine learning/algorithms ; User study -- Fastwords: adapting passwords to constrained keyboards / Markus Jakobsson and Ruj Akavipat : The principles behind fastwords ; Basic feature set ; Extended feature set ; Sample stories and frequencies ; Recall rates ; Security analysis ; The security of passwords ; Entry speed ; Implementation of fastword entry -- Deriving PINs from passwords / Markus Jakobsson and Debin Liu : A brief discussion of passwords ; How to derive PINs from passwords ; Analysis of passwords and derived PINs ; Security analysis ; Usability experiments -- Visual preference authentication / Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir : Password resets ; Security questions aren't so secure ; What is visual preference-based authentication ; Evaluating visual preference-based authentication ; Case study: visual Blue Moon authentication -- The deadly sins of security user interfaces / Nathan Good : Security applications with frustrating user interfaces ; The four sins of security application user interfaces ; Consumer choice: a security bugbear ; Security by verbosity ; Walls of checkboxes ; All or nothing switch -- SpoofKiller: let's kiss spoofing goodbye! / Markus Jakobsson and William Leddy : A key to the solution: interrupts ; Why can the user log in to good sites, but not bad ones? ; What about sites that are good but not certified good? ; SpoofKiller: under the hood ; Say we implement SpoofKiller: then what? -- Device identification and intelligence / Ori Eisen : 1995-2001: the early years of device identification ; 2001-2008: tagless device identification begins ; 2008-present: private browsing and beyond -- How can we determine if a device is infected or not? / Aurélien Francillon, Markus Jakobsson, and Adrian Perrig : Why detection is difficult ; Setting up an isolated environment ; What could go wrong? ; Brief comparison with TrustZone -- 8. The future. Security needs the best user experience / Hampus Jakobsson : How the user won over features ; So how come the iPhone became so successful ; A world of information anywhere ; Midas' touch screens ; New input, new opportunities ; Zero-click and real-life user interfaces ; Privacy and user interfaces ; It all comes together -- Fraud and the future / Markus Jakobsson. |
| Abstract | "Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them"-- Provided by publisher. |
| Bibliography note | Includes bibliographical references (pages 339-358) and index. |
| LCCN | 2011047198 |
| ISBN | 9781118062418 (pbk.) |
| ISBN | 1118062418 (pbk.) |