Recently, attackers have discovered how to use hyperlinks to implement a security attack on our personal computers, a ruse called clickjacking (CJ). CJ doesn’t exploit a bug or a misconfigura- tion that might exist in a system, as in many other typical attacks, but instead exploits a Web page’s intrinsic capability to implement hyperlinks, a well-known and widespread feature in which almost all of us trust, to date. In this article, we describe a practical example of how an attacker can implement a CJ attack and discuss possible countermeasures.

Frightened by Links / Franco Callegati; Marco Ramilli. - In: IEEE SECURITY & PRIVACY. - ISSN 1540-7993. - STAMPA. - 7:(2009), pp. 72-76. [10.1109/MSP.2009.177]

Frightened by Links

CALLEGATI, FRANCO;RAMILLI, MARCO
2009

Abstract

Recently, attackers have discovered how to use hyperlinks to implement a security attack on our personal computers, a ruse called clickjacking (CJ). CJ doesn’t exploit a bug or a misconfigura- tion that might exist in a system, as in many other typical attacks, but instead exploits a Web page’s intrinsic capability to implement hyperlinks, a well-known and widespread feature in which almost all of us trust, to date. In this article, we describe a practical example of how an attacker can implement a CJ attack and discuss possible countermeasures.
2009
Frightened by Links / Franco Callegati; Marco Ramilli. - In: IEEE SECURITY & PRIVACY. - ISSN 1540-7993. - STAMPA. - 7:(2009), pp. 72-76. [10.1109/MSP.2009.177]
Franco Callegati; Marco Ramilli
File in questo prodotto:
Eventuali allegati, non sono esposti

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/85653
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 0
social impact