Publications

Publications

  • M. Jakobsson, H. Siadati. “Improved Visual Preference Authentication.”, In STAST 2012. Click here for paper.
  • M. Jakobsson, L. Yang, and S. Wetzel. “Quantifying the Security of Preference-Based Authentication.” In DIM ’08. Click here for paper.
  • M. Jakobsson, E. Stolterman, S. Wetzel, and L. Yang. “Love and Authentication.” (Notes). In ACM Computer/Human Interaction Conference (CHI 2008). Click here for paper.
  • M. Jakobsson, A. Juels, and J. Ratkiewicz. “Privacy-Preserving History Mining for Web Browsers.” In Web 2.0 Security and Privacy, 2008. Click here for paper.
  • A. Juels, S. Stamm, and M. Jakobsson. “Combating Click Fraud via Premium Clicks.” USENIX Security ’07. Click here for paper. Click here for slides.
  • A. Juels, M. Jakobsson, and T. Jagatic. “Cache Cookies for Browser Authentication.” (Extended Abstract), IEEE Security and Privacy. 2006. Click here for the published paper, and here for a full version.
  • M. Jakobsson and S. Stamm. “Invasive Browser Sniffing and Countermeasures.” WWW2006. 2006. Click here for the paper.

 


Mobile Authentication
Publisher: Springer
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more.

“Concepts I was already familiar with, but I found that I learned a tremendous amount, and think that this book is a must have for anyone in the security field.” -Avi Rubin, Professor, Johns Hopkins University

The Death of the Internet
Publisher: Wiley
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.

“I encourage anyone with an interest in the Internet; in technology; in online commerce, or indeed in a fair and open society to read this book. These are important topics and this book does an excellent job in provoking alternative ways of thinking about them.” -MIchael Barrett, CISO, PayPal
crimewareCrimeware: Understanding New Attacks and Defenses
Publisher: Symantec press
A book co-edited by RavenWhite founder Markus Jakobsson.
This book is meant for anyone with an interest in crimeware, computer security, and eventually, the survivability of the Internet. It is not meant only for people with a technical background. Rather, it is also appropriate for makers of laws and policies, user interface designers, and companies concerned with user education. The book is not intended as a guide to securing one’s system, but rather as a guide to determining what the problem really is and what it will become.

“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.” -Garth Bruen, Project KnujOn Designer
phishing and countermeasuresPhishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Publisher: Wiley
A work co-edited by RavenWhite founder Markus Jakobsson. Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.

“I highly recommend this as a must-read book in the collection of phishing literature.”
–Computing Reviews.com, September 13, 2007