Front Matter
Part I The Problem
Chapter 1 What Could Kill the Internet? And so What?
Chapter 2 It is About People
2.1 Human and Social Issues——arkus Jakobsson
2.2 Who are the Criminals? —— Igor Bulavko
Chapter 3 How Criminals Profit
3.1 Online Advertising Fraud——Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux
3.2 Toeing the Line: Legal but Deceptive Service Offers ——Markus Jakobsson and Ruilin Zhu
3.3 Phishing and Some Related Attacks—— Markus Jakobsson and William Leddy
3.4 Malware: Current Outlook——Members of the BITS Security Working Group and staff leads Greg Rattray nd Andrew Kennedy
3.5 Monetization——Markus Jakobsson
Chapter 4 How ThingsWork and Fail
4.1 Online Advertising: With Secret Security—— Markus Jakobsson
4.2 Web Security Remediation Efforts——Jeff Hodges and Andy Steingruebl
4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content——Juan Caballero, Adam Barth, and Dawn Song
4.4 Our Internet Infrastructure at Risk——Garth Bruen
4.5 Social Spam——Dimitar Nikolov and Filippo Menczer
4.6 Understanding CAPTCHAs and Their Weaknesses——Elie Bursztein
4.7 Security Questions——Ariel Rabkin
4.8 Folk Models of Home Computer Security——Rick Wash and Emilee Rader
4.9 Detecting and Defeating Interception Attacks Against SSL——Christopher Soghoian and Sid Stamm
Chapter 5 The Mobile Problem
5.1 Phishing on Mobile Devices——Adrienne Porter Felt and David Wagner
5.2 Why Mobile Malware will Explode——Markus Jakobsson and Mark Grandcolas
5.3 Tapjacking: Stealing Clicks on Mobile Devices——Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh
Chapter 6 The Internet and the PhysicalWorld
6.1 Malware-Enabled Wireless Tracking Networks——Nathaniel Husted and Steven Myers
6.2 Social Networking Leaks——Mayank Dhiman and Markus Jakobsson
6.3 Abuse of Social Media and Political Manipulation——Bruno Gonc¸alves, Michael Conover, and Filippo Menczer
Part II Thinking About Solutions
Chapter 7 Solutions to the Problem
7.1 When and How to Authenticate——Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka,Jesus Molina, Yuan Niu, and Jeff Song
7.2 Fastwords: Adapting Passwords to Constrained Keyboards——Markus Jakobsson and Ruj Akavipat
7.3 Deriving PINs from Passwords——Markus Jakobsson and Debin Liu
7.4 Visual Preference Authentication——Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir
7.5 The Deadly Sins of Security User Interfaces——Nathan Good
7.6 SpoofKiller—Let’s Kiss Spoofing Goodbye!——Markus Jakobsson and William Leddy
7.7 Device Identification and Intelligence——Ori Eisen
7.8 How can we Determine if a Device is Infected or not?——Aur´elien Francillon, Markus Jakobsson, and Adrian Perrig
Chapter 8 The Future
8.1 Security Needs the Best User Experience Hampus Jakobsson
8.2 Fraud and the Future——Markus Jakobsson
References
Index