usenix conference policies
WWW Electronic Commerce and Java Trojan Horses
Authors:
J.D. Tygar and Alma Whitten, Carnegie Mellon University
Abstract:
World Wide Web electronic commerce applications often require consumers to enter private information (such as credit card numbers) into forms in the browser window. If third parties can insert trojan horse applications onto a consumer's machine, they can monitor keyboard strokes and steal private information.
This paper outlines a simple way to accomplish this using Java or similar remote execution facilities. We implemented a simple version of this attack. We give a general method, window personalization, that can thwart or prevent this attack.
BibTeX
@inproceedings {260578,
author = {J.D. Tygar and Alma Whitten},
title = {{WWW} Electronic Commerce and Java Trojan Horses},
booktitle = {2nd USENIX Workshop on Electronic Commerce (EC 96)},
year = {1996},
address = {Oakland, CA},
url = {https://www.usenix.org/conference/2nd-usenix-workshop-electronic-commerce/www-electronic-commerce-and-java-trojan-horses},
publisher = {USENIX Association},
month = nov
}
author = {J.D. Tygar and Alma Whitten},
title = {{WWW} Electronic Commerce and Java Trojan Horses},
booktitle = {2nd USENIX Workshop on Electronic Commerce (EC 96)},
year = {1996},
address = {Oakland, CA},
url = {https://www.usenix.org/conference/2nd-usenix-workshop-electronic-commerce/www-electronic-commerce-and-java-trojan-horses},
publisher = {USENIX Association},
month = nov
}
connect with us