Self-signed executables: restricting replacement of program binaries by malware

  • Authors:
  • Glenn Wurster;P. C. van Oorschot

  • Affiliations:
  • School of Computer Science, Carleton University, Canada;School of Computer Science, Carleton University, Canada

  • Venue:
  • HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Current phishing attacks focus primarily on stealing user credentials such as passwords. In response, web sites are deploying stronger authentication and back-end analytics systems that make it harder for phishers to extract value from stolen passwords. ...