期刊文献+

抗授权劫持攻击的安全电子交易方案 被引量:1

Anti-Authority Hijack Secure Electronic Transaction
下载PDF
导出
摘要 针对现有的网络交易安全方案中存在授权与认证分离及与交易相关的敏感操作在复杂、未审计环境下完成等问题,本文提出了一个基于可信计算模块的安全电子交易方案.该方案采用可信设备(如,安全智能手机、安全PDA等)作为安全交易认证与交易授权终端;将交易认证与交易授权绑定,确保安全敏感操作在独立可信强审计计算环境中完成.即使敌手拥有对客户端计算机的完全控制,本方法亦可有效抵抗中间人攻击、浏览器劫持、交易授权劫持、以及keylogger等间谍软件威胁. We propose a trusted computing module based secure electronic transaction architecture, which uses trusted equipment as the identity authentication and transaction authorization terminal. The new framework binds authentication and authorization in e-transaction operations and guarantees the secure sensitive operation is executed properly in an independent, trusted, auditable environment. Our approach thwarts Man-in-the-Middle attacks, protects a user's account even in the presence of most spywares like keyloggers and fends off the authorization hijack attacks efficiently.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期593-597,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家高技术研究发展计划(863)项目(2006AA01Z402 2006AA01Z422) 国家自然科学基金资助项目(60703044 60672102)
关键词 身份窃取 WEB欺骗 授权劫持 identity theft Web spoofing authorization hijack
  • 相关文献

参考文献8

  • 1Kaspersky Laboratory. Analyst' s Diary [EB/OL]. [2007-07-12]. http://www, viruslist, com/en/weblog? calendar:2007- 05.
  • 2Schouwenberg R. Targeted Banker Malware on Ddemand. The Last Minutes Presentation, VB2007[EB/ OL]. [ 2007-10-15 ]. http ;//www. virusbtn, com/con- f erence / vb2OO 7 /abstracts /Last Minute3. xml.
  • 3Prono B, Kuo C, Perrig A. Phoolproof Phishing Prevention[C]//Proceedings of the Financial Cryptography and Data Security 10th International Confer-ence. Berlin: Springer-Verlag, 2006.
  • 4Sharp R, Madhavapeddy A, Want R, et al. Fighting Crimeware: An Architecture for Split-Trust Web Applications[R/OL]. [2007-09-25]. http://rich, recoil. org/ publications/crimeware-techreport, pd f .
  • 5Citibank. Virtual Account Number[EB/OL]. [2007- 05-27]. http://www, citibank, com/us/cards/tour/cb/ shpvan, htrn.
  • 6Sailer R,Zhang X,Jaeger T,et al. Design and Implementation of a TCG-Based Integrity Measurement Architecture[ C ]/ / Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley:USENIX Association, 2004.
  • 7Sharp R,Scott J,Beresford A. Secure Mobile Compu ting Via Public Terminals [C/OL]. [2007-09-23]. http ://research. microsoft, com/-jws/ pub files/ perva sive2OO6-securemobilecomputing, pd f .
  • 8McCune M J, Perrig A, Reiter K M. Bump in the Ether:A Framework for Securing Sensitive User Input [C/OL]. [2007-06-21]. http://sparrow, ece. cmu. edu/group/ pub/mccunej_bite, pd f .

同被引文献6

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部