Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Using the Self Service BMC Helpdesk
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Digital Certificate Installation & User Guide For Class-2 Certificates.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /7/181Data Mining & Machine Learning Lab.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Attacking Session Management Juliette Lessing
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
The Internet & The World Wide Web Notes
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Norman SecureSurf Protect your users when surfing the Internet.
A detailed guide on how to set-up your printing storefront. Please Note: Storefronts are compatible with all browsers, however for optimal use of the admin.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Welcome to the University of West Florida Online Employment System Applicant Tutorial.
Getting started on informaworld™ How do I register my institution with informaworld™? How is my institution’s online access activated? What do I do if.
Prevent Cross-Site Scripting (XSS) attack
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Reliability & Desirability of Data
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
JavaScript, Fourth Edition
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Browser Security Evaluation IE6 vs. IE7 vs. Firefox 3.0 Gowri Kanugovi.
11 A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval Reporter: 林佳宜 /10/17.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
CCT355H5 F Presentation: Phishing November Jennifer Li.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
Topic 5: Basic Security.
IPSOS / Vodafone / Novartis Kenya 17 December 2014.
1 Mezzanine Ware (Pty) Ltd © 2014 Installing\Uninstalling the Mezzanine Helium Android application.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
2004/051 >> Supply Chain Solutions That Deliver Users.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Unit 13 – Website Development FEATURES OF WEBSITES.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Learning Aim A.  Websites are constructed on many different features.  It can be useful to think about these when designing your own websites.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Section II Terms Emily Stepp.
Online password manager By: Anthony diveronica
Introduction to Networking
Phishing is a form of social engineering that attempts to steal sensitive information.
LO4 - Be Able to Update Websites to Meet Business Needs
Spear Phishing Awareness
Wireless Spoofing Attacks on Mobile Devices
Exploring DOM-Based Cross Site Attacks
Cybersecurity Simplified: Phishing
Presentation transcript:

Presenter: Dr. Xiaojiang (James) Du 4/29/2015 MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones 1 Longfei Wu, Xiaojiang Du, and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA, 19122, USA

Phishing Attacks  Phishing attacks aim to steal private information such as usernames, passwords, and credit card details by impersonating a legitimate entity.  Although security researchers have proposed many anti-phishing schemes, phishing attacks’ threat has not been well mitigated:  Phishing sites expire and revive rapidly (Avg. 4.5 days).  Attackers keep improving their techniques to circumvent existing anti-phishing tools.  Mobile users are accustomed to being requested and providing credentials without checking the website. 4/29/2015 2

Phishing Attacks  Most targeted Industry Sectors 4/29/2015 3

Phishing Attacks Cont.  Almost all phishing attacks on PC are in the form of bogus websites. Current browsers on PC are embedded with anti- phishing tools that can achieve a detection rate of over 90%.  However, during the adaptation to hardware-constrained mobile platforms, browsers abandoned or truncated many features and useful functions (like anti-phishing). 4 Open the same phishing site with Chrome on PC and Chrome for Android

Mobile Phishing Attacks  Mobile Web Phishing  Mobile phishing is an emerging threat targeting at mobile users of financial institutions, online shopping and social networking companies.  Mobile App Phishing  Some attackers develop fake applications (Apps) or repackage legitimate Apps, then upload these phishing Apps to unofficial app markets.  It is harder to detect Phishing Apps than Phishing on mobile web pages. (Information can be retrieved from Html source code in webpages).  The trend of launching phishing attacks on mobile devices can be attributed to hardware limitations such as small screen size, and the inconvenience of user input and application switching. 4/29/2015 5

Existing Phishing Detection Schemes  Current web phishing detection schemes can be roughly divided into two categories: heuristics-based schemes and blacklist-based schemes.  Blacklist-based schemes can only detect phishing sites that are in the blacklist but can not detect zero-day phishing attacks.  Heuristics-based schemes largely depend on features extracted from URL and HTML source code, and other techniques like machine learning are used to determine the validity. However, we find that features extracted from HTML source code could be inaccurate and phishing sites can circumvent those heuristics.  There is no off-the-shelf tool to detect phishing Apps on mobile platform. 4/29/2015 6

Our Solutions and Contributions  We propose MobiFish, a novel automated lightweight anti- phishing scheme for mobile phones.  It is able to defend against both phishing webpages and Apps.  Find the weakness of previous heuristics-based security schemes for webpage phishing, and develop a lightweight solution that utilizes optical character recognition (OCR)  without reliance on HTML source code, search engine or machine learning techniques.  Implement MobiFish on Google Nexus 4 smartphone running Android 4.2 operating system.  Evaluate MobiFish with 100 phishing URLs and corresponding legitimate URLs,  as well as “Facebook” phishing Apps. 4/29/2015 7

Mobile Webpage Phishing Attacks  Mobile user interface increases the vulnerability to mobile phishing attacks.  Due to the small display size of phone screens, most mobile browsers have to remove the status bar and hide the URL bar once the web page finishes loading.  Even during the loading process, long URLs are truncated to fit the browser frame.  Since the ability to read and verify URLs is crucial in detecting phishing attacks, partial URL or even URL displayed with partial domain name would certainly increase the risk of being spoofed by phishing attacks. 4/29/2015 8

Mobile Application Phishing Attacks  Application-oriented phishing attacks can be categorized into two types based on the way they launch:  Some phishing apps attempt to hijack existing legitimate targets.  They keep performing task polling, and launch themselves as long as they detect the launch of target apps.  As the result, the fake login interface covers on top of the real one, and the phishing app pretends to be the target app.  Another type of phishing apps directly appears as the target app.  This may occur when user downloads fake apps from unofficial app markets.  The mobile App phishing attack ends with transmission of credentials to the attacker.  Hence, blocking the transmission can effectively defend the attack. 4/29/2015 9

Overview of MobiFish Scheme  Phishing attackers apply fancy tactics to direct victims to their phishing sites or applications, which masquerade as trustworthy entities.  The key to solve phishing problem is to find the discrepancy between the identity it claims and the actual identity.  MobiFish consists of two independent components designed for mobile webpages and mobile applications  WebFish and AppFish. 4/29/

Design of WebFish 4/29/  We find that information extracted from HTML source code may not reflect the webpage displayed to users,  since attackers can add texts, images and links into HTML source code while making any “undesirable” content invisible,  by simply changing their size or covering them with other images.  Hence, features like word frequency, brand name and company logo could be easily manipulated.  The claimed identity should be extracted from the screen presented to a user.  The actual identity can be obtained from the web address (or network connection).

Identity Extraction 4/29/  The claimed identity is extracted from a screenshot.  Most login interfaces of legitimate mobile sites and apps are very simple. The entire login page or the majority of page can be captured in one screenshot.  To obtain claimed identity from a screenshot, OCR technique is utilized to convert image into text.  We use Tesseract, one of the most accurate open source OCR engines.  The actual identity is obtained from the web address.  Most enterprises use brand name as the second-level domain name (SLD) of their official websites.  In cases that brand names are not exactly the same as SLD (e.g. brand name “AT&T” and SLD “att”), we build a whitelist that records common pairs of inconsistent brand name and SLD.  brand name “AT&T” is directly mapped to SLD “att”, and vice versa.

Identity Extraction Cont. 4/29/  OCR Experiments  Our testing uses a Thinkpad T420 laptop (2.40GHz, 4GB RAM) with pixel density of 131 dpi and a Google Nexus 4 smartphone (1.5GHz, 2GB RAM) with 320 dpi pixel density.  We open the Ebay mobile login page in both mobile and PC browsers, each captures a screenshot. Then, Tesseract is used to extract text from phone screenshot while Microsoft Office Document Imaging (MODI) is used for the screenshot on PC.  Tesseract only takes 1.6 seconds while MODI uses 4.5 seconds.  Tesseract  MODI

Design of WebFish Cont. 4/29/  Finally, WebFish compare the claimed identity with the actual identity.

Design of WebFish Cont. 4/29/  The key idea of WebFish to detect a phishing URL is that the SLD is not among the text extracted from the screenshot of the login page.  As far as we know, no phishing site uses common terms in login pages like “sign”, “username”, “password” or “welcome” as SLD.  It is not likely for well constructed and maintained legitimate web pages to have strange words.  If the actual domain name of a phishing site appears in the login page of fake websites, users can easily spot it and check the URL to verify the validity of the webpage.  If the attacker includes the phishing domain name in the screen in a tiny font size, then OCR is not able to recognize it either and WebFish will still mark it as a phishing site.

Design of AppFish 4/29/  AppFish maintains a database called suspicious app set (SAS), which contains profiles of untrusted apps  including user ID (Uid), launching time and screenshot text.  These apps should be:  Specified for one company. This is to ensure that the app only connects to the company’s official sites or affiliated (partners) servers.  The domain name of collaborators are pre-checked and added to the SAS profile in advance. (e.g. Facebook and its content delivery networks)  Have user login. There are lots of apps that do not need users to login, in which App phishing attacks would not happen at all. (e.g. apps for news, games, music or map)

Design of AppFish Cont.  Phishing apps are not able to load valid following pages. Users will suspect their validity in a short time.  Hence, a phishing app can only send out user credentials during a short period (denoted as T) after user clicks the phishing page.  AppFish monitors the possible paths that allow a phishing app to transmit data to outside,  which include socket, HttpGet/HttpPost, SMS, ( is based on socket), etc.  AppFish rules:  The SLD name of the Http connection destination has to be in the text or affiliated domain names stored in SAS profile.  Socket and SMS function could be blocked for a period of time, which should be long enough for user to notice (and uninstall) the phishing app. 4/29/

Design of AppFish Cont.  The AppFish defense scheme works in two phases: launching phase and authentication phase. 4/29/

Performance Evaluation  We implement MobiFish on a Nexus 4 smartphone. We modify the source code of Android 4.2 system so that it is able to support MobiFish.  Experiments with WebFish  We randomly pick up 100 phishing URLs from PhishTank.com.  Most of them are highly similar to their legitimate counterparts.  The input forms in phishing login pages are often surrounded by brand names or company logos as the legitimate login pages.  When loading a large conventional web page, mobile browsers often display the area that contains the input form instead of displaying an overview of the entire web page. 4/29/

Performance Evaluation Cont.  WebFish is able to detect all the phishing webpages and achieves 100% verification rate of legitimate URLs 4/29/

Performance Evaluation Cont.  Experiments with AppFish  There are only a few reported phishing apps and none of them is available online.  To test the effectiveness of AppFish, we develop two sample phishing apps: one can hijack real Facebook app and the other appears as “Facebook”.  After user clicks the “Log in” button, the fake apps send the credentials to our server by HttpGet, HttpPost, socket, SMS, and , respectively.  AppFish can block all the connections and warn users about the phishing attempts. 4/29/

Conclusion 4/29/  We proposed MobiFish, a novel lightweight mobile phishing defense scheme.  MobiFish uses OCR, which can accurately extract text from the screenshot of mobile login interface so that the claimed identity is obtained. Mobile phones have higher dpi than PC.  Compared to existing OCR-based anti-phishing schemes (designed for PC only), Mobifish is lightweight and it works without using external search engines or machine learning algorithms.  We implemented MobiFish on a Google Nexus 4 smartphone, and conduct experiments, which show that MobiFish and AppFish can effectively detect and defend against mobile phishing attacks.

Thank You! Prof. Xiaojiang (James) Du Dept. of Computer and Information Sciences Temple University Philadelphia, PA, 19122, USA Web: 4/29/