X hits on this document





10 / 11

Proceedings of the 7th Australian Information Security Management Conference

ACKNOWLEDGEMENT The author specially thanks A/Prof Craig Valli for giving me the opportunity to write this paper and Dr. Judy Clayden and Dr. Greg Maguire for discussion and improving the writing style.


Akwukwuma, V. V. N., & Egwali, A. O. (2008). E-Commerce: Online Attacks and Protective Mechanisms. Asian Journal of Information Technology, 7(9), 394-402.

Bayden Systems. (2004). TamperIE. Retrieved November 26, 2009, from http://www.bayden.com/TamperIE/

BitDefender. (2008). Trojan.PWS.ChromeInject.B. Retrieved October 30, 2009, from http://www.bitdefender.com/VIRUS-1000451-en--Trojan.PWS.ChromeInject.B.html

Blum, R., & LeBlanc, D.-A. (2009). Linux for dummies: For Dummies.

Blunden, B. (2009). The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Jones & Bartlett Publishers.

Commonwealth Bank of Australia. (n.d.). An example of a token security used in online banking authentication: Commonwealth Bank of Australia.

Croll, A., & Power, S. (2009). Complete Web Monitoring: O'Reilly Media, Inc.

Cronto (2008). Beyond Phishing - De-Mystifiying The Growing Threat of Internet Banking Fraud. Journal. Retrieved from www.cronto.com/.../internet_banking_fraud_beyond_phishing.pdf

F-Secure Corporation. (2007). Trojan-Spy:W32/Nuklus.A. Retrieved October 21, 2009, 2009, from http://www.f- secure.com/v-descs/trojan-spy_w32_nuklus_a.shtml

Fadia, A. (2006). The Unofficial Guide to Ethical Hacking Second Edition: Thomson Course Technology.

Gühring, P. (2006). Concepts against Man-in-the-Browser Attacks. Journal. Retrieved from http://www2.futureware.at/future.htm

Hruska, J. (2008). New trojan targets Firefox, masquerades as Greasemonkey. Retrieved October 209, 2009, from http://arstechnica.com/security/news/2008/12/new-trojan-targets-firefox-masquerades-as- greasemonkey.ars

Ilett, D. (2006). Financial firms suffer most Trojan attacks. Retrieved September 26, 2009, from http://www.silicon.com/financialservices/0,3800010322,39157190,00.htm

Keizer, G. (2009). Sneaky Microsoft plug-in puts Firefox users at risk. Retrieved October 29, 2009, from h t t p : / / w w w . c o m p u t e r w o r l d . c o m / s / a r t i c l e / 9 1 3 9 4 5 9 / S n e a k y _ M i c r o s o f t _ p l u g _ i n _ p u t s _ F i r e f o x _ u s e r s _ a risk t _

Krebs, B. (2006). Password-Stealing Trojan Disguised as Firefox Extension. Retrieved September 28, 2009, from http://blog.washingtonpost.com/securityfix/2006/07/passwordstealing_trojan_disgui.html

Leyden, J. (2008). Firefox plug-in Trojan harvests logins. Retrieved October 29, 2009, from http://www.theregister.co.uk/2008/12/04/firefox_plug_in_trojan/

Litan, A., & Allan, A. (2006). Transaction Verification Complements Fraud Detection and Stronger Authentication. Retrieved September 25, 2009, from http://www.tricipher.com/threats/man_in_the_browser.html

Louw, M. T., & Lim, J. S. (2008). Enhancing web browser security against malware extensions. Journal in Computer Virology, 4(3), 179-195.

Microsoft Corporation. (2009). Component Object Model Technology. Retrieved October 30, 2009, from http://www.microsoft.com/com/default.mspx

Oiaga, M. (2006). Internet Explorer BHO Trojan: Transmits stolen data via ICMP packets. Retrieved September 28, 2009, from http://news.softpedia.com/news/Internet-Explorer-BHO-Trojan-32403.shtml

Ollmann, G. (2009). 'Man-in-the-browser' Attack Vectors & Commercial Cyber-crime. Journal. Retrieved from www.zisc.ethz.ch/.../ETH2009-CommercialCyberCrime-GunterOllmann.pdf

Pogue, D. (2004). Windows XP home edition: the missing manual: O'Reilly Media, Inc.

Raffetseder, T., Kirda, E., & Kruegel, C. (2007). Building Anti-Phishing Browser Plug-Ins: An Experience Report. Paper presented at the 29th International Conference on Software Engineering Workshops(ICSEW'07).

118| P a g e

Document info
Document views46
Page views46
Page last viewedFri Jan 20 20:15:31 UTC 2017