The Battle Against Phishing: Dynamic Security Skins

25
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley

description

The Battle Against Phishing: Dynamic Security Skins. Rachna Dhamija and J.D. Tygar U.C. Berkeley. Security Properties for Usability. Limited human skills property Unmotivated users property General purpose graphics property Golden arches property Barn door property. - PowerPoint PPT Presentation

Transcript of The Battle Against Phishing: Dynamic Security Skins

Page 1: The Battle Against Phishing: Dynamic Security Skins

The Battle Against Phishing:Dynamic Security Skins

Rachna Dhamija and J.D. TygarU.C. Berkeley

Page 2: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property

3. General purpose graphics property

4. Golden arches property

5. Barn door property

Page 3: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property

3. General purpose graphics property

4. Golden arches property

5. Barn door property

Page 4: The Battle Against Phishing: Dynamic Security Skins

Limited Human Skills Property

• Limited password recall • Hard to parse domain names

Page 5: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property1. Security is often the secondary goal

3. General purpose graphics property

4. Golden arches property

5. Barn door property

Page 6: The Battle Against Phishing: Dynamic Security Skins

Users Don’t Check Certificates

Page 7: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property

3. General purpose graphics property

4. Golden arches property

5. Barn door property

Page 8: The Battle Against Phishing: Dynamic Security Skins

Firefox Browser: 4 SSL indicators

Page 9: The Battle Against Phishing: Dynamic Security Skins

Firefox browser - No unsecure indicators

Page 10: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property

3. General purpose graphics property

4. Golden arches property1. Train users not to automatically trust a logo or brand

5. Barn door property

Page 11: The Battle Against Phishing: Dynamic Security Skins

The golden arches property

Page 12: The Battle Against Phishing: Dynamic Security Skins

Security Properties for Usability

1. Limited human skills property

2. Unmotivated users property

3. General purpose graphics property

4. Golden arches property

5. Barn door property

Page 13: The Battle Against Phishing: Dynamic Security Skins

Strong Password Protocols

• Stanford Web PwdHash

• Password Authenticated Key Agreement– EKE, SPEKE, SNAPI, AuthA, PAK, SRP, etc…

H(password, siteID)Password

ProtocolPassword

Page 14: The Battle Against Phishing: Dynamic Security Skins

Password Authenticated Key Agreement

• Advantages:– preserve familiar use of passwords

• user doesn’t need a trusted device• secret stored in memory of the user

– server doesn’t store password– no passwords sent over the network– user authentication (& mutual authentication)

• But how to enter the password?

Page 15: The Battle Against Phishing: Dynamic Security Skins

Our Solution: Usability Goals

• User must be able to verify password prompt, before entering password

• Rely on human skills– To login, recognize 1 image & recall 1 password– To verify server, compare 2 images

• Hard to spoof security indicators

Page 16: The Battle Against Phishing: Dynamic Security Skins

Trusted Password Window

• Dedicated window • Trusted path customization• Random photo assigned or chosen• Image stored in browser, do not have

to go through server• Image overlaid across window • User recognizes image first

– then enters password

• Password not sent to server

Page 17: The Battle Against Phishing: Dynamic Security Skins

Security Indicators

• How can user distinguish secure windows?– Static indicators (SSL)

• Can be spoofed• User do not really examine it

– User customized indicators (Passmark/Petnames)• Require extra efforts from the user

– Automated customized indicators

Page 18: The Battle Against Phishing: Dynamic Security Skins

Our Solution: Dynamic Security Skins

Automatically customize secure windows

Visual hashes– Random Art - visual hash algorithm – Generate unique abstract image for each authentication– Use the image to “skin” windows or web content– Browser generated or server generated

Page 19: The Battle Against Phishing: Dynamic Security Skins

Browser Generated Images

Browser chooses random number and generates image Can be used to modify border or web elements

Page 20: The Battle Against Phishing: Dynamic Security Skins

Server Generated Images

Server & browser independently generate same image Server can customize its own page

Page 21: The Battle Against Phishing: Dynamic Security Skins

Conclusions

• Benefits:– Achieves mutual authentication– Resistant to phishing and spoofing– Relies on human skills

• Weaknesses:– Users must check images

• easier than checking a cert– Local storage of personal image reduces

portability, requires security– Doesn’t address spyware, keyloggers

Page 22: The Battle Against Phishing: Dynamic Security Skins

Status and Future Work

• Iterative design & “lo-fi” testing of interface

• Formal user study

• DSS Mozilla extension

Page 23: The Battle Against Phishing: Dynamic Security Skins
Page 24: The Battle Against Phishing: Dynamic Security Skins

Customized Indicators: Petname Toolbar

Page 25: The Battle Against Phishing: Dynamic Security Skins

Automated Indicators:Secure Random Dynamic Boundaries