The homograph attack

@article{Gabrilovich2002TheHA,
  title={The homograph attack},
  author={E. Gabrilovich and A. Gontmakher},
  journal={Commun. ACM},
  year={2002},
  volume={45},
  pages={128}
}
Computing veterans remember an old habit of crossing zeros (O) in program listings to avoid confusing them with the letter O, in order to make sure the operator would type the program correctly into the computer. This habit, once necessary, has long been rendered obsolete by the increased availability of editing tools. However, the underlying problem of character resemblance is still there. Today it seems we may have to acquire a similar habit, this time to address an issue much more… Expand
104 Citations

Topics from this paper

Chance and Deception : Attacks That Rely On User Actions
  • Highly Influenced
Computer and Intrusion Forensics
  • 99
  • Highly Influenced
Enhanced Classification Method for Homograph Attack Detection
  • Highly Influenced
ShamFinder: An Automated Framework for Detecting IDN Homographs
  • 11
  • Highly Influenced
  • PDF
Safeguard against unicode attacks: generation and applications of UC-simlist
  • 5
  • Highly Influenced
  • PDF
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements
Assessing the Privacy Benefits of Domain Name Encryption
  • 5
  • PDF
...
1
2
3
4
5
...