TY - GEN
T1 - DeCore
T2 - 6th International Conference on Security and Privacy in Communication Networks, SecureComm 2010
AU - Sundareswaran, Smitha
AU - Squicciarini, Anna C.
PY - 2010
Y1 - 2010
N2 - Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike. In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which specifically targets sites that host user uploaded content on Web 2.0 sites. This latent threat is poorly addressed, if at all, by current protection systems, both at the remote sites and at the client ends. We design and develop an approach that protects from content repurposing attacks at the client end. As we show through a detailed evaluation, our solution promptly detects and stops various types of attacks and adds no overhead to the user's local machine or browser where it resides. Further, our approach is light-weight and does not invasively monitor all the user interactions with the browser, providing an effective protection against these new and powerful attacks.
AB - Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike. In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which specifically targets sites that host user uploaded content on Web 2.0 sites. This latent threat is poorly addressed, if at all, by current protection systems, both at the remote sites and at the client ends. We design and develop an approach that protects from content repurposing attacks at the client end. As we show through a detailed evaluation, our solution promptly detects and stops various types of attacks and adds no overhead to the user's local machine or browser where it resides. Further, our approach is light-weight and does not invasively monitor all the user interactions with the browser, providing an effective protection against these new and powerful attacks.
UR - http://www.scopus.com/inward/record.url?scp=84864330690&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84864330690&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-16161-2_12
DO - 10.1007/978-3-642-16161-2_12
M3 - Conference contribution
AN - SCOPUS:84864330690
SN - 364216160X
SN - 9783642161605
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 199
EP - 216
BT - Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings
Y2 - 7 September 2010 through 9 September 2010
ER -