Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
Luka MalisaKari KostiainenThomas KnellDavid M. SommerSrdjan CapkunPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- user interface
- security threats
- countermeasures
- human computer interaction
- penetration testing
- security mechanisms
- security vulnerabilities
- ddos attacks
- user interaction
- application development
- security issues
- malicious attacks
- traffic analysis
- user interface design
- end users
- watermarking algorithm
- watermarking scheme
- direct manipulation
- security risks
- data mining
- watermark extraction
- digital image watermarking scheme
- terrorist attacks
- java card
- dos attacks
- design principles
- information systems