Papers
https://www.cs.dartmouth.edu/~sws/abstracts/ys02.shtml
Last modified: 08/27/03 11:56:54 AM
E. Ye, S.W. Smith.
``Trusted Paths for Browsers.''
11th Usenix Security Symposium.
August 2002
Abstract
Computer security protocols usually terminate in a computer;
however, the human-based services they support
usually terminate in a human. The gap between the human
and the computer creates potential for security problems.
This paper examines this gap, as it is manifested in "secure"
Web services. Felten et al demonstrated the potential,
in 1996, for malicious servers to impersonate honest
servers. Our recent follow-up work explicitly shows how
malicious servers can still do this-and can also forge the
existence of an SSL session and the contents of the alleged
server certificate. This paper reports the results of
our ongoing experimental work to systematically defend
against Web spoofing, by creating a trusted path from the
browser to the human user.
Download
PDF
Tarballs, and demo
See Also
Ye thesis
Ye Yuan Smith 2002
Spoofing demo