Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Website spoofing

Known as: WEB spoofing, Microsoft Firefox 2007, Site spoofs 
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Phishing is a security threat which combines social engineering and website spoofing techniques to deceive users into revealing… Expand
Is this relevant?
2006
2006
Appointments Stanford University, Visiting Scholar, July 2009 June 2010. Schulich School of Business, York University, Associate… Expand
  • figure 1
  • table 1
Is this relevant?
2006
2006
Cryptoanalysis.- DPA-Resistant Finite Field Multipliers and Secure AES Design.- Signed MSB-Set Comb Method for Elliptic Curve… Expand
Is this relevant?
2005
2005
Phishing and Web spoofing have proliferated and become a major nuisance on the Internet. The attacks are difficult to protect… Expand
Is this relevant?
2004
2004
In spite of the use of standard web security measures, swindlers often clone sensitive web sites and/or present false credentials… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
  • Amir Herzberg
  • Proceedings of the Fifth Mexican International…
  • 2004
  • Corpus ID: 9474068
The main security mechanism for web surfing is the SSL/TLS protocol. This is a good tool, but, it has limitations and should be… Expand
Is this relevant?
2003
2003
Web proxies can be used for a variety of services. Web browsers typically offer the option not only to statically configure a web… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
1998
1998
We use the Web Spoofing attack reported by Cohen and also the Secure Internet Programming Group at Princeton University to give a… Expand
Is this relevant?
Review
1998
Review
1998
The paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the… Expand
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Web spoofing allows an attacker to create a “shadow copy” of the entire World Wide Web. Accesses to the shadow Web are funneled… Expand
  • figure 1
Is this relevant?