{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:47:03Z","timestamp":1725515223061},"publisher-location":"Boston, MA","reference-count":26,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_5","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"63-77","source":"Crossref","is-referenced-by-count":1,"title":["Robbing Banks with Their Own Software\u2014an Exploit Against Norwegian Online Banks"],"prefix":"10.1007","author":[{"given":"Yngve","family":"Espelid","sequence":"first","affiliation":[]},{"given":"Lars\u2013Helge","family":"Netland","sequence":"additional","affiliation":[]},{"given":"Andr\u2019e N.","family":"Klingsheim","sequence":"additional","affiliation":[]},{"given":"Kjell J.","family":"Hole","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Adams, C., Lloyd, S.: Understanding PKI\u2014Concepts, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley (2003)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why cryptosystems fail. In: ACM 1st Conference on Computer and Communication Security. Fairfax, VA, USA (1993)","DOI":"10.1145\/168588.168615"},{"key":"5_CR3","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors\u2014a survey. Technical Report 641, University of Cambridge (2005). URL http:\/\/www.cl.cam.ac. uk\/\u02dcmkb23\/research\/Survey.pdf"},{"key":"5_CR4","unstructured":"Andrews, M., Whittaker, J.A.: How to BreakWeb Software\u2014Functional and Security Testing of Web Applications and Web Services. Addison-Wesley (2006)"},{"key":"5_CR5","unstructured":"BankID: Hva gj\u00f8r kunden ved mistanke om at noe er galt? (2007). URL http:\/\/www. bankid.no\/index.db2?id=4066. Last checked March 2008 (in Norwegian)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Berkman, O., Ostrovsky, O.M.: The unbearable lightness of pin cracking. In: Financial Cryptography and Data Security (FC). Lowlands, Scarborough, Trinidad\/Tobago (2007). URL http:\/\/www.arx.com\/documents\/The_Unbearable_Lightness_of_ PIN_Cracking.pdf","DOI":"10.1007\/978-3-540-77366-5_20"},{"key":"5_CR7","unstructured":"Biancuzzi, F.: Disclosure Survey (2006). URL http:\/\/www.securityfocus.com\/ columnists\/415. Last checked March 2008"},{"key":"5_CR8","unstructured":"Christey, S., Wysopal, C.: Responsible vulnerability disclosure process (2002). URL http:\/\/www.whitehats.ca\/main\/about_us\/policies\/ draft-christey-wysopal-vuln-disclosure-00.txt. Last checked March 2008"},{"key":"5_CR9","unstructured":"Cranor, L.F., Garfinkel, S. (eds.): Security and Usability\u2014Designing Secure Systems That People Can Use. O\u2019Reilly (2005)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Espelid, Y., Netland, L.H., Klingsheim, A.N., Hole, K.J.: A proof of concept attack against norwegian internet banking systems. In: Proc. Financial Cryptography and Data Security (2008)","DOI":"10.1007\/978-3-540-85230-8_18"},{"key":"5_CR11","unstructured":"Gartner: Gartner study finds significant increase in e-mail phishing attacks (2004). URL http:\/\/www.gartner.com\/press_releases\/asset_71087_11.html. Last checked March 2008"},{"key":"5_CR12","unstructured":"Gj\u00f8steen, K., Hole, K.J.: Nei, enn\u00e5 ikke trygg. Aftenposten (29. Nov, 2007). URL http: \/\/www.aftenposten.no\/meninger\/debatt\/article2126133.ece. Last checked March 2008 (in Norwegian)"},{"key":"5_CR13","unstructured":"G\u00fcuhring, P.: Concepts against man-in-the-browser attacks (2006). URL http:\/\/www2. futureware.at\/svn\/sourcerer\/CAcert\/SecureClient.pdf. Last checkedMarch 2008"},{"key":"5_CR14","unstructured":"Gundel, T.: Phishing and internet banking security (2005). URL ftp:\/\/ftp.software. ibm.com\/software\/tivoli\/whitepapers\/Phishing_and_Internet_ Banking_Security.pdf"},{"key":"5_CR15","unstructured":"Hoglund, G., McGraw, G.: Exploiting Software\u2014How to Break Code. Addison-Wesley(2004)"},{"issue":"6","key":"5_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2007.168","volume":"5","author":"K.J. Hole","year":"2007","unstructured":"Hole, K.J., Moen, V., Klingsheim, A.N., Tande, K.M.: Lessons from the Norwegian ATM system. IEEE Security & Privacy 5(6), 25\u201331 (2007)","journal-title":"IEEE Security & Privacy"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Hole, K.J., Moen, V., Tj\u00f8stheim, T.: Case study: Online banking security. IEEE Security & Privacy 4(2), 14\u201320 (2006)","DOI":"10.1109\/MSP.2006.36"},{"key":"5_CR18","unstructured":"Hole, K.J., Tj\u00f8stheim, T., Moen, V., Netland, L., Espelid, Y., Klingsheim, A.N.: Next generation internet banking in Norway. Tech. Rep. 371, Institute of Informatics, University of Bergen (2008). Available at: http:\/\/www.ii.uib.no\/publikasjoner\/texrap\/ pdf\/2008-371.pdf"},{"key":"5_CR19","unstructured":"Huseby, S.H.: Innocent Code. Wiley (2004)"},{"key":"5_CR20","unstructured":"Kent, S.T., Millett, L.I. (eds.): IDs\u2014Not That Easy: Questions About Nationwide Identity Systems. The National Academies Press (2002)"},{"key":"5_CR21","unstructured":"Kent, S.T., Millett, L.I. (eds.): Who Goes There? Authentication Through the Lens of Privacy. The National Academies Press (2003)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Marsh, S., Dibben, M.R.: Trust, untrust, distrust and mistrust\u2014an exploration of the darker side. In: iTrust 2005, LNCS, vol. 3477, pp. 17\u201333. Springer (2005)","DOI":"10.1007\/11429760_2"},{"issue":"4","key":"5_CR23","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1145\/1053291.1053327","volume":"48","author":"B. Schneier","year":"2005","unstructured":"Schneier, B.: Two-factor authentication: too little, too late. Communications of the ACM 48(4), 136 (2005)","journal-title":"Communications of the ACM"},{"key":"5_CR24","unstructured":"Sun Microsystems, Inc.: Applets. URL http:\/\/java.sun.com\/applets\/. Last checked March 2008"},{"key":"5_CR25","unstructured":"The Norwegian Banks\u2019 Payment and Clearing Centre: BankID FOI white paper (Release 2.0.0) (2006). (in Norwegian)"},{"key":"5_CR26","unstructured":"Viega, J., McGraw, G.: Building Secure Software\u2014How to Avoid Security Problems the Right Way. Addison-Wesley (2002)"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:45:50Z","timestamp":1619574350000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_5","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}