Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.

Slides:



Advertisements
Similar presentations
1 CompChall: Addressing Password Guessing Attacks IAS, ITCC-2005, April 2005 CompChall: Addressing Password Guessing Attacks By Vipul Goyal OSP Global.
Advertisements

Online Privacy A Module of the CYC Course – Personal Security
Web Shift Booking System
Secure Web Authentication With Mobile Phones Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Secure SharePoint mobile connectivity
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Learn to protect yourself... a 21 st Century Scam.. Phishing.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Internet Phishing Not the kind of Fishing you are used to.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
Trust and Semantic Attacks- Phishing Hassan Takabi October 20, 2009.
Course 201 – Administration, Content Inspection and SSL VPN
Presented By Jay Dani.  Web Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine,
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
USING REFWORKS Fall What is RefWorks? A web-based bibliographic and database manager Creighton University faculty, students, and staff have access.
Prevent Cross-Site Scripting (XSS) attack
Hacking Phishing Passwords Sourendu Gupta (TIFR).
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Chapter 13 – Network Security
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Browser Security Evaluation IE6 vs. IE7 vs. Firefox 3.0 Gowri Kanugovi.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Protecting Students on the School Computer Network Enfield High School.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
A Quick Insight Paper about phishing attacks based on usability study Users required to classify websites as fraudulent/legitimate using security tools.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Conveying Trust Serge Egelman.
Phishing is a form of social engineering that attempts to steal sensitive information.
What is Phishing? Pronounced “Fishing”
Week 7 - Wednesday CS363.
Cybersecurity Simplified: Phishing
Presentation transcript:

Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab

User Is Part Of System “ Weakest link ” in operational security systems If attackers can easily trick users into compromising their security, they do not have to try hard to directly attack the system. A typical attack: Phishing

Security Indicators “ Look for the lock at the bottom of your browser and ‘ https ’ in front of the website address. ”

Security Indicators “ Look for the lock at the bottom of your browser and ‘ https ’ in front of the website address. ”

More Security Indicators

Spoofstick

More Security Indicators Netcraft Toolbar

More Security Indicators Trustbar

More Security Indicators eBay Account Guard

More Security Indicators Spoofguard

Outline Introduction of security indicators  Anti-phishing user study Web authentication using cell phones Conclusions

Security Toolbar Abstractions SpoofStick Netcraft Toolbar eBay Account Guard SpoofGuard Neutral-Information Toolbar System-Decision Toolbar Positive-Information Toolbar TrustBar

Study Scenario We set up dummy accounts as John Smith at various websites “ You are the personal assistant of John Smith. John is on vacation now. During his vacation, he sometimes sends you s asking you to do some tasks for him online. ” “ Here is John Smith ’ s profile. ”

Study Scenario Users dealt with 20 s forwarded by John Smith. 5 s were phishing s. Most of the s were about managing John ’ s wish lists at various sites

Main Frame

Address bar frame

Toolbar frame Status bar frame

Attack Types 1. Similar-name attack 2. IP-address attack 3. Hijacked-server attack 4. Popup-window attack 5. Paypal attack bestbuy.com  bestbuy.com  bestbuy.com 

Security Toolbar Display Legitimate Site Phishing Site vs.

Attack Pattern

Recruitment 30 users –Recruited at MIT, paid $15 for one hour –10 for each toolbar –Average age 27 [18-50] –14 females and 16 males –20 MIT students, 10 not Neutral-Information Toolbar System-Decision Toolbar Positive-Information Toolbar

Spoof Rates With Different Toolbars

Spoof Rates With Different Attacks p = (ANOVA)

Why Did Users Get Fooled? 20 out of 30 got fooled by at least one attack. Among the 20 users –17 (85%) claimed web content is professional or familiar; 7 (35%) depended on security-related content –12 (60%) explained away odd behaviors “ I have been to sites that use plain IP addresses. ” “ Sometimes I go to a website, and it directs me to another site with a different address. ” “ Yahoo may have just opened a branch in Brazil and thus registered there. ” “ I must have mistakenly triggered the popup window. ”

Results Users did not rely on security indicators –Depended on web content instead –Cannot distinguish poorly designed websites from malicious phishing attacks

Outline Introduction of security indicators Anti-phishing user study  Web authentication using cell phones Authentication protocol User study An improved protocol Conclusions

Authentication Using Cell Phones Prevent people ’ s passwords from being captured by public computers Use trusted cell phone to authenticate login sessions from untrusted public computers Checking security indicator is part of the authentication protocol

Authentication Protocol

Login attempt

Authentication Protocol Login attempt “This login session is named ‘FAITH’.” “FAITH” “Do you approve login session named ‘FAITH’?” “FAITH”

Authentication Protocol Login attempt “This login session is named ‘FAITH’.” “FAITH” “Do you approve login session named ‘FAITH’?” “FAITH”

Authentication Protocol Login attempt “This login session is named ‘FAITH’.” “FAITH” “Do you approve login session named ‘FAITH’?” “FAITH” “I approve ‘FAITH’.”

Authentication Protocol Login attempt “This login session is named ‘FAITH’.” “FAITH” “Do you approve login session named ‘FAITH’?” “FAITH” Log in “I approve ‘FAITH’.”

User Interface

Attack Types Duplicated attackBlocking attack

User Study Log in to Amazon.com with a personal computer and a cell phone 6 logins in a row Attacks were randomly selected and assigned to the 5 th or the 6 th login 20 users –Recruited at MIT, paid $10 for one hour –Average age 25 [ ] –9 females and 11 males –16 MIT students, 4 not

Results Duplicated attack: 36% (4 successful out of 11 attacks) –“ There must be a bug in the proxy since the session name displayed in the computer does not match the one in the cell phone. ” Blocking attack: 22% (2 successful out of 9 attacks) –“ The network connection must be really slow since the session name has not been displayed. ” Users failed to follow the protocol –Cannot distinguish system failures from malicious attacks

An Improved Protocol Thanks to Steve Strassman from Orange™

Under Attacks Duplicated AttackBlocking attack

Results Login by choosing a correct session name has zero spoof rate! –9 duplicated attacks and 11 blocking attacks –There was little chance that the attacker’s list included the user’s session name in the browser –Users were forced to attend to the security indicator

Conclusions Security indicator checking scheme fails –Users ignore advice (34% spoof rate) –Users do not follow instructions (30% spoof rate) –Users cannot distinguish “ bugs ” from “ attacks ” –Security indicator is not part of the user ’ s “ critical action sequence ”

Lesson Learned Moving the security indicator into the critical action sequence can better protect users

Users Cared About Security 18 out of 30 uncheck “ remember me ” 13 out of 30 logged out (or tried to) after at least one task

Legitimate Site Phishing Site