Delayed Password Disclosure Mutual Authentication to Fight Phishing Steve Myers Indiana University, Bloomington Joint work with: Markus Jakobsson Indiana.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Akshat Sharma Samarth Shah
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Internet Phishing Not the kind of Fishing you are used to.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Electronic Transaction Security (E-Commerce)
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
CMSC 414 Computer and Network Security Lecture 23 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Samuvel Johnson nd MCA B. Contents  Introduction to Real-time systems  Two main types of system  Testing real-time software  Difficulties.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Chapter 5 Security Threats to Electronic Commerce
Reliability & Desirability of Data
Chapter 13 – Network Security
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
Security Planning and Administrative Delegation Lesson 6.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
“Stronger” Web Authentication: A Security Review Cory Scott.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Types of Electronic Infection
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
10/20/2015 ©2006 Scott Miller, University of Victoria 1 User Authentication Content Generation The Use of Cookies Content Pooling Rev 1.5.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
CHAPTER 9 Sniffing.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Lecture 1 Page 1 CS 236 Online What Are Our Security Goals? CIA Confidentiality –If it’s supposed to be a secret, be careful who hears it Integrity –Don’t.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Computer Security By Duncan Hall.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
CPT 123 Internet Skills Class Notes Internet Security Session B.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Safe Computing Practices. What is behind a cyber attack? 1.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
IT Security  .
ISYM 540 Current Topics in Information System Management
Secure Sockets Layer (SSL)
Phishing, what you should know
Chapter 5 Electronic Commerce | Security
Phishing is a form of social engineering that attempts to steal sensitive information.
Chapter 5 Electronic Commerce | Security
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
What is Phishing? Pronounced “Fishing”
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Delayed Password Disclosure Mutual Authentication to Fight Phishing Steve Myers Indiana University, Bloomington Joint work with: Markus Jakobsson Indiana University, Bloomington

What is Phishing? Attack combines social engineering and technology An attack that tricks users out of confidential information: –Authentication –Financial (Credit Card, SSN,…) –Other possibilities in the future?

How It’s Typically Done? Create authentic looking fraudulent web- page Spam a large number of users, directing them to fraudulent site. Hope a certain percentage of people visit, and provide requested authentication information. Make use of provided information

Why is it Being Done & Why is it Successful? Low risk of being caught Easy to implement attack Potentially a very high payout Hard for users to differentiate between authentic site and phishers’. Users lack ability to authenticate site.

Real World Mutual Authentication Case Study: Bank transaction Bank explicitly authenticates client –Asks to see ID, Bank Card, etc…. Client implicitly authenticates bank –Cost of building authentic looking branch or ATM –Banks protect trademarks, logos, etc… Done by legal enforcement. –Hard to direct a lot of traffic to one branch. –High risks and low rewards for an impersonator

Implicit Authentication Assumptions Do Not Hold in the Digital World Easy to duplicate legitimate looking site –Bugs in browsers make this true even for security experts Hard for companies to enforce trademarks online Easy to direct a large number of users to fraudulent site High reward and low risk for many impersonators

Traditional Phishing Attack

Why not use PAKE? PAKE Protocol

Doppelganger Monitor Attacks Web-server running PAKE protocol Web-server with no security protocol Window looks identical to that used for PAKE Users password sent in clear to phisher

Doppelganger Monitor Attacks: Passive vs. Adaptive

Delayed Password Disclosure User feedback authenticates site Each character of password provides image/authenticity feedback. Wrong Images=Wrong Site! –Stop entering correct password. –User can stop before releasing whole password Correct images cannot be inferred from fake session

Delayed Password Disclosure Protects against passive Doppelganger Monitor Attacks Phishers cannot provide correct images without performing Adaptive MIM Doppelganger Attack

Username= Alice Alice Enters P 1 1-out-of-c OT P1P1 P2P2 P3P3 P4P4 Alice’s Password= 1-out-of-c 2 OT Alice Enters P 2 Database of Images specific to Alice Password Authenticated Key Exchange P1P2P3P4P5P1P2P3P4P5 P1P2P3P4P5P1P2P3P4P5 1-out-of-c 3 OTAlice Enters P 3 P5P5 Bank P i 2 [1..c]

Issue: Very efficient 1-out-of-n OT algs are slow when n is large Solution: –Replace servers DB of images with seeds –Transmit seeds instead of images Client uses seeds to generate random-art –DB of seeds in round i computed based on user previously selected seeds in rounds i-1 –Each OT round can be 1-out-of-c. Efficiency?

Security & Correctness Requirements for Modifications Seeds need to be same in every execution –Ensures same pictures are always revealed Ensure password secrecy is maintained Ensure that j invocations of protocol are needed to learn j sequences of seeds.

Username= Alice Alice Enters P 1 1-out-of-c OT P1P1 P2P2 P3P3 P4P4 Alice’s Password= 1-out-of-c OT Alice Enters P 2 P5P5 Bank P i 2 [0.. (c-1)] S 2 {0,1} n Pic. corsp. v 1 =F s (P 1 ) x 1 2 u [0..q-1] x 2 2 u [0..q-1] 1-out-of-c OTAlice Enters P 3 g is gen. for group of order q. F is a PRFG

Computational Costs Client performs 2 exps. per char. in password Server needs to perform c exponentiations per char. in password High computational load for server New extension: –Costs 2 extra comm. flows per char –3 exps. per char. for client –3 exps. per char. for server

Full Implementation Costs Efficient OT [NP01] (RO-Model) –One time cost of c exponentiations –Client 1 exp per OT –Server 1 exp per OT Efficient PAKE [KOY01] (Stand-Model) –Client & Server take 3 exp

Security and Usability of DPD DPD as secure as PAKE or SSL alternative. User must protect images from prying eyes. DPD not immune to Adptv. Dplgngr. Attck, but: –Technically more challenging to perform –Attack should be easier for bank to detect. No extra hardware is required! User Interface: more complicated User education necessary!

Questions?