WWW Electronic Commerce and Java Trojan Horses

نویسندگان

  • J. D. Tygar
  • Alma Whitten
چکیده

World Wide Web electronic commerce applications often require consumers to enter private informa tion such as credit card numbers into forms in the browser window If third parties can insert trojan horse applications onto a consumer s machine they can monitor keyboard strokes and steal private infor mation This paper outlines a simple way to accomplish this using Java or similar remote execution facilities We implemented a simple version of this attack We give a general method window personalization that can thwart or prevent this attack

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Full Bindingness and Confidentiality: Requirements for Secure Computers, and Design Options

As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the costs of attacking, through Trojan horses, crypto impleme ntations on computers with mainstream operating systems, are low. This threatens legal certainty, either because such Trojan horses will emerge, or because their...

متن کامل

A Real-time Auction System over the Www

This paper presents an electronic auction system as a case study of a distributed computing application using the Java language and the Voyager distributed programming platform. It stresses the importance of state-of-the-art WWW development tools that address the run-to-the-market need of electronic commerce applications. Conceptual simplicity and efficient design and implementation are the maj...

متن کامل

Trojan horse attacks on software for electronic signatures

Electronic signatures are introduced by more and more countries as legally binding means for signing electronic documents with the primary hope of boosting e-commerce and e-government. Given that the underlying cryptographic methods are sufficiently strong, attacks by Trojan horse programs on electronic signatures are becoming increasingly popular. Most of the current systems either employ cost...

متن کامل

Synthesis of Services in Open Commerce Environments

This paper addresses the issue of integrating several technologies for realising electronic commerce solutions that go beyond the current state-of-the-art. Integration enables synthesis of services offered by multiple diverse autonomous service providers. This is achieved in the framework provided by the Aurora architecture for network-centric applications. This architecture complements the COR...

متن کامل

Phishing - A Growing Threat to E-Commerce

In today’s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing – a constantly growing and evolving threat to Internet based comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996