1 Introduction 2 Unicode Background 2.1 Brief History of Character Encodings 3 Visual Spoofing 4 Character and String Transformation Vulnerability