Using Context and Interactions to Verify User-Intended Network Requests. Article Swipe
Client-side malware can attack users by tampering with applications or user interfaces to generate requests that users did not intend. We propose Verified Intention (VInt), which ensures a network request, as received by a service, is user-intended. VInt is based on seeing what the user (context). VInt screenshots the user interface as the user interacts with a security-sensitive form. There are two main components. First, VInt ensures output integrity and authenticity by validating the context, ensuring the user sees correctly rendered information. Second, VInt extracts user-intended inputs from the on-screen user-provided inputs, with the assumption that a human user checks what they entered. Using the user-intended inputs, VInt deems a request to be user-intended if the request is generated properly from the user-intended inputs while the user is shown the correct information. VInt is implemented using image analysis and Optical Character Recognition (OCR). Our evaluation shows that VInt is accurate and efficient.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://export.arxiv.org/pdf/2007.15805
- OA Status
- green
- References
- 73
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3046228635
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3046228635Canonical identifier for this work in OpenAlex
- Title
-
Using Context and Interactions to Verify User-Intended Network Requests.Work title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-07-31Full publication date if available
- Authors
-
Shuang He, Michelle Y. Wong, David LieList of authors in order
- Landing page
-
https://export.arxiv.org/pdf/2007.15805Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://export.arxiv.org/pdf/2007.15805Direct OA link when available
- Concepts
-
Computer science, Context (archaeology), User interface, User interface design, Human–computer interaction, Computer security, User experience design, Operating system, Biology, PaleontologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
73Number of works referenced by this work
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3046228635 |
|---|---|
| doi | |
| ids.mag | 3046228635 |
| ids.openalex | https://openalex.org/W3046228635 |
| fwci | |
| type | preprint |
| title | Using Context and Interactions to Verify User-Intended Network Requests. |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998000264167786 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T11424 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9995999932289124 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Security and Verification in Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8086202144622803 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2779343474 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5731136202812195 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3109175 |
| concepts[1].display_name | Context (archaeology) |
| concepts[2].id | https://openalex.org/C89505385 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5716171264648438 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q47146 |
| concepts[2].display_name | User interface |
| concepts[3].id | https://openalex.org/C149229913 |
| concepts[3].level | 3 |
| concepts[3].score | 0.4529511034488678 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q135707 |
| concepts[3].display_name | User interface design |
| concepts[4].id | https://openalex.org/C107457646 |
| concepts[4].level | 1 |
| concepts[4].score | 0.4439050257205963 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q207434 |
| concepts[4].display_name | Human–computer interaction |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.36532115936279297 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C201025465 |
| concepts[6].level | 2 |
| concepts[6].score | 0.3263949155807495 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11248500 |
| concepts[6].display_name | User experience design |
| concepts[7].id | https://openalex.org/C111919701 |
| concepts[7].level | 1 |
| concepts[7].score | 0.09534686803817749 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[7].display_name | Operating system |
| concepts[8].id | https://openalex.org/C86803240 |
| concepts[8].level | 0 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[8].display_name | Biology |
| concepts[9].id | https://openalex.org/C151730666 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7205 |
| concepts[9].display_name | Paleontology |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8086202144622803 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/context |
| keywords[1].score | 0.5731136202812195 |
| keywords[1].display_name | Context (archaeology) |
| keywords[2].id | https://openalex.org/keywords/user-interface |
| keywords[2].score | 0.5716171264648438 |
| keywords[2].display_name | User interface |
| keywords[3].id | https://openalex.org/keywords/user-interface-design |
| keywords[3].score | 0.4529511034488678 |
| keywords[3].display_name | User interface design |
| keywords[4].id | https://openalex.org/keywords/human–computer-interaction |
| keywords[4].score | 0.4439050257205963 |
| keywords[4].display_name | Human–computer interaction |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.36532115936279297 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/user-experience-design |
| keywords[6].score | 0.3263949155807495 |
| keywords[6].display_name | User experience design |
| keywords[7].id | https://openalex.org/keywords/operating-system |
| keywords[7].score | 0.09534686803817749 |
| keywords[7].display_name | Operating system |
| language | en |
| locations[0].id | mag:3046228635 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | arXiv (Cornell University) |
| locations[0].landing_page_url | http://export.arxiv.org/pdf/2007.15805 |
| authorships[0].author.id | https://openalex.org/A5101879260 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-9744-0752 |
| authorships[0].author.display_name | Shuang He |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | He Shuang |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5045765056 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2502-6640 |
| authorships[1].author.display_name | Michelle Y. Wong |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Michelle Y. Wong |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5049933072 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-2000-6827 |
| authorships[2].author.display_name | David Lie |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | David Lie |
| authorships[2].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://export.arxiv.org/pdf/2007.15805 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2020-08-07T00:00:00 |
| display_name | Using Context and Interactions to Verify User-Intended Network Requests. |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-10-10T17:16:08.811792 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2114722071, https://openalex.org/W2755895417, https://openalex.org/W2968172377, https://openalex.org/W2580748925, https://openalex.org/W1506506709, https://openalex.org/W2929776435, https://openalex.org/W1593626423, https://openalex.org/W2736232408, https://openalex.org/W2866583935, https://openalex.org/W2730665462, https://openalex.org/W3078483469, https://openalex.org/W2870273173, https://openalex.org/W2856610919, https://openalex.org/W2823247875, https://openalex.org/W961612757, https://openalex.org/W3018941576, https://openalex.org/W2245691126, https://openalex.org/W3095604951, https://openalex.org/W1607157108, https://openalex.org/W2943116378 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | mag:3046228635 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | arXiv (Cornell University) |
| best_oa_location.landing_page_url | http://export.arxiv.org/pdf/2007.15805 |
| primary_location.id | mag:3046228635 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | arXiv (Cornell University) |
| primary_location.landing_page_url | http://export.arxiv.org/pdf/2007.15805 |
| publication_date | 2020-07-31 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W1582716752, https://openalex.org/W2962986948, https://openalex.org/W2784050770, https://openalex.org/W2535840109, https://openalex.org/W2216664396, https://openalex.org/W2155907478, https://openalex.org/W2964018263, https://openalex.org/W2101889913, https://openalex.org/W2002964284, https://openalex.org/W2144191116, https://openalex.org/W2113000322, https://openalex.org/W2407386804, https://openalex.org/W2151712075, https://openalex.org/W3009588933, https://openalex.org/W2060482703, https://openalex.org/W3004923694, https://openalex.org/W2875814315, https://openalex.org/W2017802026, https://openalex.org/W2131906261, https://openalex.org/W2102001185, https://openalex.org/W2028223155, https://openalex.org/W2785681938, https://openalex.org/W2036329595, https://openalex.org/W2618043096, https://openalex.org/W3100346152, https://openalex.org/W1969761599, https://openalex.org/W3007611003, https://openalex.org/W2408141691, https://openalex.org/W192036632, https://openalex.org/W2166731089, https://openalex.org/W1530443667, https://openalex.org/W1490535594, https://openalex.org/W2963815185, https://openalex.org/W2120660108, https://openalex.org/W2050924894, https://openalex.org/W1633185320, https://openalex.org/W2616594753, https://openalex.org/W1774682829, https://openalex.org/W2734718887, https://openalex.org/W2963178695, https://openalex.org/W2605982830, https://openalex.org/W1972524097, https://openalex.org/W2805843504, https://openalex.org/W2073294836, https://openalex.org/W2106869436, https://openalex.org/W1965775770, https://openalex.org/W2185917628, https://openalex.org/W2612608334, https://openalex.org/W2405267032, https://openalex.org/W2166004296, https://openalex.org/W2167804035, https://openalex.org/W2136310957, https://openalex.org/W2112731379, https://openalex.org/W2129987527, https://openalex.org/W2109376948, https://openalex.org/W2888121333, https://openalex.org/W2159024673, https://openalex.org/W2001642682, https://openalex.org/W2951413859, https://openalex.org/W2157286909, https://openalex.org/W1705596515, https://openalex.org/W2297075900, https://openalex.org/W2700054830, https://openalex.org/W2589988760, https://openalex.org/W2831467141, https://openalex.org/W2117285489, https://openalex.org/W2147307693, https://openalex.org/W1602618623, https://openalex.org/W88813478, https://openalex.org/W2010608681, https://openalex.org/W1945616565, https://openalex.org/W2156491735, https://openalex.org/W2559800592 |
| referenced_works_count | 73 |
| abstract_inverted_index.a | 27, 33, 57, 97, 110 |
| abstract_inverted_index.We | 20 |
| abstract_inverted_index.as | 30, 52 |
| abstract_inverted_index.be | 113 |
| abstract_inverted_index.by | 5, 32, 72 |
| abstract_inverted_index.if | 115 |
| abstract_inverted_index.is | 35, 38, 118, 128, 134, 149 |
| abstract_inverted_index.on | 40 |
| abstract_inverted_index.or | 9 |
| abstract_inverted_index.to | 12, 112 |
| abstract_inverted_index.Our | 144 |
| abstract_inverted_index.and | 70, 139, 151 |
| abstract_inverted_index.are | 61 |
| abstract_inverted_index.can | 2 |
| abstract_inverted_index.did | 17 |
| abstract_inverted_index.not | 18 |
| abstract_inverted_index.the | 43, 49, 53, 74, 77, 89, 94, 105, 116, 122, 126, 130 |
| abstract_inverted_index.two | 62 |
| abstract_inverted_index.VInt | 37, 47, 66, 84, 108, 133, 148 |
| abstract_inverted_index.from | 88, 121 |
| abstract_inverted_index.main | 63 |
| abstract_inverted_index.sees | 79 |
| abstract_inverted_index.that | 15, 96, 147 |
| abstract_inverted_index.they | 102 |
| abstract_inverted_index.user | 10, 44, 50, 54, 78, 99, 127 |
| abstract_inverted_index.what | 42, 101 |
| abstract_inverted_index.with | 7, 56, 93 |
| abstract_inverted_index.There | 60 |
| abstract_inverted_index.Using | 104 |
| abstract_inverted_index.based | 39 |
| abstract_inverted_index.deems | 109 |
| abstract_inverted_index.form. | 59 |
| abstract_inverted_index.human | 98 |
| abstract_inverted_index.image | 137 |
| abstract_inverted_index.shown | 129 |
| abstract_inverted_index.shows | 146 |
| abstract_inverted_index.users | 4, 16 |
| abstract_inverted_index.using | 136 |
| abstract_inverted_index.which | 25 |
| abstract_inverted_index.while | 125 |
| abstract_inverted_index.(OCR). | 143 |
| abstract_inverted_index.First, | 65 |
| abstract_inverted_index.attack | 3 |
| abstract_inverted_index.checks | 100 |
| abstract_inverted_index.inputs | 87, 124 |
| abstract_inverted_index.output | 68 |
| abstract_inverted_index.seeing | 41 |
| abstract_inverted_index.(VInt), | 24 |
| abstract_inverted_index.Optical | 140 |
| abstract_inverted_index.Second, | 83 |
| abstract_inverted_index.correct | 131 |
| abstract_inverted_index.ensures | 26, 67 |
| abstract_inverted_index.inputs, | 92, 107 |
| abstract_inverted_index.intend. | 19 |
| abstract_inverted_index.malware | 1 |
| abstract_inverted_index.network | 28 |
| abstract_inverted_index.propose | 21 |
| abstract_inverted_index.request | 111, 117 |
| abstract_inverted_index.Verified | 22 |
| abstract_inverted_index.accurate | 150 |
| abstract_inverted_index.analysis | 138 |
| abstract_inverted_index.context, | 75 |
| abstract_inverted_index.ensuring | 76 |
| abstract_inverted_index.entered. | 103 |
| abstract_inverted_index.extracts | 85 |
| abstract_inverted_index.generate | 13 |
| abstract_inverted_index.properly | 120 |
| abstract_inverted_index.received | 31 |
| abstract_inverted_index.rendered | 81 |
| abstract_inverted_index.request, | 29 |
| abstract_inverted_index.requests | 14 |
| abstract_inverted_index.service, | 34 |
| abstract_inverted_index.Character | 141 |
| abstract_inverted_index.Intention | 23 |
| abstract_inverted_index.correctly | 80 |
| abstract_inverted_index.generated | 119 |
| abstract_inverted_index.integrity | 69 |
| abstract_inverted_index.interacts | 55 |
| abstract_inverted_index.interface | 51 |
| abstract_inverted_index.on-screen | 90 |
| abstract_inverted_index.tampering | 6 |
| abstract_inverted_index.(context). | 46 |
| abstract_inverted_index.assumption | 95 |
| abstract_inverted_index.efficient. | 152 |
| abstract_inverted_index.evaluation | 145 |
| abstract_inverted_index.interfaces | 11 |
| abstract_inverted_index.validating | 73 |
| abstract_inverted_index.Client-side | 0 |
| abstract_inverted_index.Recognition | 142 |
| abstract_inverted_index.components. | 64 |
| abstract_inverted_index.implemented | 135 |
| abstract_inverted_index.screenshots | 48 |
| abstract_inverted_index.applications | 8 |
| abstract_inverted_index.authenticity | 71 |
| abstract_inverted_index.information. | 82, 132 |
| abstract_inverted_index.user-intended | 86, 106, 114, 123 |
| abstract_inverted_index.user-provided | 91 |
| abstract_inverted_index.user-intended. | 36 |
| abstract_inverted_index.security-sensitive | 58 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.46000000834465027 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |