- From: Rachna Dhamija <rachna.public@gmail.com>
- Date: Thu, 24 May 2007 10:53:41 -0700
- To: public-wsc-wg@w3.org
Received on Thursday, 24 May 2007 17:53:48 UTC
An MSR researcher presented this paper at the Oakland conference this week. It describes scenarios where an attacker can compose DOM trees and user action sequences to spoof the address bar and status bar. A Systematic Approach to Uncover Security Flaws in GUI Logic Shuo Chen, José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang http://research.microsoft.com/~shuochen/papers/GUILogicSecurity.pdf Where do attacks like this fit in our threat tree? (this may be one of the out of scope branches.) Rachna
Received on Thursday, 24 May 2007 17:53:48 UTC