FIDO2 With Two Displays - Or How to Protect Security-Critical Web Transactions Against Malware Attacks.
Timon HackenjosBenedikt WagnerJulian HerrJochen RillMarek WehmerNiklas GoerkeIngmar BaumgartPublished in: CoRR (2022)
Keyphrases
- security threats
- security problems
- protection mechanisms
- security mechanisms
- malware detection
- computer security
- security protocols
- attack scenarios
- java card
- website
- security vulnerabilities
- cyber attacks
- security breaches
- detect malicious
- security issues
- web applications
- fault injection
- unauthorized access
- security measures
- intrusion detection
- security risks
- network security
- database
- anti virus
- data encryption
- access control
- malicious users
- countermeasures
- security flaws
- intrusion detection system
- cryptographic protocols
- intrusion detection and prevention
- malicious code
- chosen plaintext
- denial of service attacks
- personal data
- static analysis
- sensitive data
- web pages
- malicious attacks
- third party
- buffer overflow
- privacy protection
- security requirements
- stream cipher
- watermarking scheme
- reverse engineering
- detecting malicious
- concurrency control
- information security
- key management