Browshing a new way of phishing using a malicious browser extension
@article{Varshney2017BrowshingAN, title={Browshing a new way of phishing using a malicious browser extension}, author={G. Varshney and M. Misra and P. Atrey}, journal={2017 Innovations in Power and Advanced Computing Technologies (i-PACT)}, year={2017}, pages={1-5} }
Phishing is a well-known cybercrime. It is performed using various tricks and techniques including email spoofing, exploiting browser vulnerabilities, web spoofing, DNS poisoning, etc. This paper sheds light on a new technique that can be used by attackers to perform a successful phishing attack through malicious browser extensions. Successful experiments have been performed over the Google Chrome browser and the technique has been validated. This paper will help researchers and browser… Expand
6 Citations
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks
- Computer Science
- J. Inf. Secur. Appl.
- 2018
- 4
A new secure authentication scheme for web login using BLE smart devices
- Computer Science
- 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)
- 2017
- 3
Achilles’ heel of plug-and-Play software architectures: a grounded theory based approach
- Computer Science
- ESEC/SIGSOFT FSE
- 2019
- 3
References
SHOWING 1-10 OF 16 REFERENCES
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
- Computer Science
- IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
- 2008
- 31
- PDF
Personal Secret Information Based Authentication towards Preventing Phishing Attacks
- Computer Science
- ACITY
- 2012
- 5
Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers
- Engineering
- 2009
- 27
Secret information display based authentication technique towards preventing phishing attacks
- Engineering, Computer Science
- ICACCI '12
- 2012
- 4
Trustworthiness testing of phishing websites: A behavior model-based approach
- Computer Science
- Future Gener. Comput. Syst.
- 2012
- 58
- PDF
Enhancing web browser security against malware extensions
- Computer Science
- Journal in Computer Virology
- 2007
- 82
- PDF
Forensic analysis of E-mail address spoofing
- Computer Science
- 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence)
- 2014
- 9