Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
Luka MalisaKari KostiainenThomas KnellDavid M. SommerSrdjan CapkunPublished in: CHES (2017)
Keyphrases
- user interface
- security threats
- security issues
- human computer interaction
- security mechanisms
- countermeasures
- malicious attacks
- ddos attacks
- watermarking scheme
- traffic analysis
- user interaction
- penetration testing
- security vulnerabilities
- terrorist attacks
- watermarking algorithm
- denial of service attacks
- watermark extraction
- chosen plaintext
- user interface design
- digital images
- watermarking method
- security risks
- digital watermarking
- watermarking technique
- application development
- attack detection
- design principles
- user experience
- malicious users
- digital image watermarking scheme
- end users