Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Managing Identity Threats May Where are the threats ? Customer Web/App Server Vulnerabilities: Trojan sniffers Soliciting to enter credentials.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Stronger Password Authentication Using Browser Extensions Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John Mitchell Stanford University
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Delayed Password Disclosure Mutual Authentication to Fight Phishing Steve Myers Indiana University, Bloomington Joint work with: Markus Jakobsson Indiana.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
SSH Secure Login Connections over the Internet
CSCI 6962: Server-side Design and Programming
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Phishing Rising to the challenge Amy Marasco Microsoft.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Types of Electronic Infection
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Chapter 21 Distributed System Security Copyright © 2008.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Phishing: Trends and Countermeasures Blaine Wilson.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Web2.0 Secure Development Practice Bruce Xia
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Phishing & Pharming. 2 Oct to July 2005 APWG.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
E-Commerce & Bank Security By: Mark Reed COSC 480.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Setting and Upload Products
ISYM 540 Current Topics in Information System Management
Conveying Trust Serge Egelman.
How to Check if a site's connection is secure ?
Using SSL – Secure Socket Layer
Fast-Track UiPath Developer Module 10: Sensitive Data Handling
Chapter 9: Configuring Internet Explorer
Week 7 - Wednesday CS363.
Presentation transcript:

Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld

Saphe surfing! 2 Motivation Phishing caused 3 Billion $ damages in 2007 alone Current solutions are not effective enough

Saphe surfing! 3 What is Phishing? Any attempt to masquerade as a legitimate server in order to obtain sensitive information Usually done by soliciting an unsuspecting user to follow a fraudulent link From: your bank To: unsuspecting user There are problems in your account. Please follow attached link to solve them.

Saphe surfing! 4 Why Phishing works? Users are naïve Its hard to detect differences in URLs: Over-reliance on SSL security Did you notice the small lock icon in the corner?

Saphe surfing! 5 Current solutions Maintaining black lists (Firefox & IE7) Phishing solicitations detection Idiosyncratic characteristics That’s me!

Saphe surfing! 6 A relevant warning This was recently published in a major Israeli bank’s web site: click me

Saphe surfing! 7 The Saphe Solution Relies on a password known only to the user and the real server Protects against: –Any impersonation of the real server –DNS poisoning –Man-in-the-Middle attacks

Saphe surfing! 8 Security assumptions AES is a strong encryption algorithm SSLv3.0 is a secure protocol Digital certificates positively identify the owner of a domain

Saphe surfing! 9 The general idea Use the password to authenticate the server to the user before using it to authenticate the user to the server Encrypt information about the current session to detect any tampering

Saphe surfing! 10 How it works Client-side code (plugin) automatically guards the user Server-side code creates data that authenticates the server to the plugin All the user needs to do is notice the plugin dialog box (or the lack of it…)

Saphe surfing! 11

Saphe surfing! 12 How it really works Plugin automatically started when relevant MIME-type is detected The password is NOT sent until the server is authenticated and the connection is proven to be tamper-free All links MUST be secure (HTTPS)

Saphe surfing! 13 How it really works (ctd) Client-side and server-side random challenge buffers are used (to prevent replay attacks) Encryption key is derived from the password and the challenges Data integrity is guaranteed with HMAC

Saphe surfing! 14 How it really works (ctd2) Key derivation function is computationally demanding to slow offline enumeration The server encrypts the following: –Connection source IP address –URL requested during the connection –Login URL

Saphe surfing! 15 How it really works (ctd3) User machine’s real IP address is retrieved from a secured (HTTPS) known server

Saphe surfing! 16 Next: Thwarting Phishing attacks!

Saphe surfing! 17 Phishing scenario #1 Redirecting the user to a fraudulent domain Forged web page similar to the real one Passive Phishing (Most common scenario)

Saphe surfing! 18 Phishing scenario #2 Active Phishing

Saphe surfing! 19 Phishing scenario #3 DNS poisoning

Saphe surfing! 20 Phishing scenario #4 Man-in-the-Middle

Saphe surfing! 21 Implementation details Firefox plugin written as a DLL in C++ Server side code written in C++ Test server written in Python Tested on Windows XP with Firefox 1.5

Saphe surfing! 22 Future versions Support more browsers and operating systems Automatic installer Allow HTML code in Saphe data Support password hashes

Saphe surfing! 23 How much is the phish? Questions? (How many fish are in this presentation?)

Saphe surfing! 24 For more details: mailto: