ITrustPage: Pretty Good Phishing Protection Stefan Saroiu, Troy Ronda, and Alec Wolman University of Toronto and Microsoft Research.

Slides:



Advertisements
Similar presentations
Using the Self Service BMC Helpdesk
Advertisements

ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
LeadManager™- Internet Marketing Lead Management Solution May, 2009.
Web browsers It’s a software application for retrieving and presenting information on WWW. An information resource is identified by a Uniform Resource.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
The Importance of Being Earnest [in Security Warnings] Serge Egelman (UC Berkeley) Stuart Schechter (Microsoft Research)
How secure is your ? Secure Primer Presented by 4Secur .com.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites Yue Zhang University of Pittsburgh Jason I. Hong, Lorrie F. Cranor Carnegie Mellon University.
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
The Inconvenient Truth about Web Certificates Jean-Pierre Hubaux Joint work with N. Vratonjic, J. Freudiger and V. Bindschaedler Work presented at WEIS.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Towards Eradicating Phishing Attacks Stefan Saroiu University of Toronto.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Bunker: A Tamper Resistant Platform for Network Tracing Stefan Saroiu University of Toronto.
Proxy Servers Dr. Ronald Bergmann, CIO, ISO. Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Part or all of this lesson was adapted from the University of Washington’s “Web Design & Development I” Course materials.
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
Phishing Rising to the challenge Amy Marasco Microsoft.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
UNAMgrid CA Juan Carlos Guel UNAM, México. Alejandro Núñez UNAM, México. Israel Becerril UNAM, México. DGSCA UNAM 31/08/06.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Wordpress Ben Mulpeter. What is wordpress?  Wordpress is a free Content management system (CMS)  It allows free tools to help design your website and.
A Crawler-based Study of Spyware on the Web Authors: Alexander Moshchuk, Tanya Bragin, Steven D.Gribble, and Henry M. Levy University of Washington 13.
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Markup and Validation Agents in Vijjana – A Pragmatic model for Self- Organizing, Collaborative, Domain- Centric Knowledge Networks S. Devalapalli, R.
Procrastinator: Pacing Mobile Apps’ Usage of the Network mobisys 2014.
Problem Statement: Users can get too busy at work or at home to check the current weather condition for sever weather. Many of the free weather software.
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
Insight 7.3 Presenter: Bob Carpenter Sales Engineer.
Introducing HingX now with Capacity Development Network.
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Searching for NZ Information in the Virtual Library Alastair G Smith School of Information Management Victoria University of Wellington.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Usable Privacy and Security and Mobile Social Services Jason Hong
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
For more information on Rouge, visit:
Internet Quarantine: Requirements for Containing Self-Propagating Code
iTrustPage: Pretty Good Phishing Protection
Unit 4 IT Security.
TOPSpro Special Topics
ISYM 540 Current Topics in Information System Management
Conveying Trust Serge Egelman.
Cross-Site Request Forgeries: Exploitation and Prevention
Risk of the Internet At Home
Extract and Correlate Evidences in Computer Forensics
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

iTrustPage: Pretty Good Phishing Protection Stefan Saroiu, Troy Ronda, and Alec Wolman University of Toronto and Microsoft Research

Phishing Attacks Cost Real Money! Hundreds of millions of $$$ cost to U.S. economy Hundreds of millions of $$$ cost to U.S. economy Affects 1+ million Internet users in U.S. alone Affects 1+ million Internet users in U.S. alone Real cost: Erosion of trust in Web as e-commerce platform Erosion of trust in Web as e-commerce platform  40% of people not banking online do not trust Web!!!

Myriad of Solutions Proposed Spam filters [CMU ‘06, SpamAssassin, Outlook] Spam filters [CMU ‘06, SpamAssassin, Outlook] Browser blacklists [IE7, FF 2.0, Opera] Browser blacklists [IE7, FF 2.0, Opera] Password managers [Princeton ‘05, Stanford ‘06, Berkeley ‘06] Password managers [Princeton ‘05, Stanford ‘06, Berkeley ‘06] Out-of-band authentication [CMU ‘06, Stanford ‘06] Out-of-band authentication [CMU ‘06, Stanford ‘06] User-created labels, warnings [Stanford ‘06] User-created labels, warnings [Stanford ‘06] Automatic fillers [MIT ‘06] Automatic fillers [MIT ‘06] Centralized approaches [MSR ‘06] Centralized approaches [MSR ‘06]

Yet… the Problem is Growing! Number of phishing sites grew 10X in 18 months Number of phishing sites grew 10X in 18 months  mid 2006 Banks claim phishing becoming #1 source of fraud Banks claim phishing becoming #1 source of fraud Phishing s becoming personalized Phishing s becoming personalized  sophisticated and hard-to-filter Must look into new anti-phishing approaches! Must look into new anti-phishing approaches!

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Current Approaches’ Shortcomings Spam filters + blacklists imperfect and too slow Spam filters + blacklists imperfect and too slow  Phishing sites’ average uptime is 4.5 days Password managers have usability problems Password managers have usability problems  Based on hard-to-grasp concepts, uncommon tasks Personalized visual clues Personalized visual clues  Rely on users to be diligent Automatic password fillers Automatic password fillers  Easy to fool + they create local password repository

Lessons Learned Anti-phishing tools must be intuitive + easy-to-use Anti-phishing tools must be intuitive + easy-to-use  Users must perform very simple, common tasks Relying on users to be diligent unlikely to work Relying on users to be diligent unlikely to work Phishing is becoming personalized Phishing is becoming personalized  Can’t rely on static filters Anti-phishing tools must re-act quickly to attacks Anti-phishing tools must re-act quickly to attacks  Cannot wait for updates or new filters

Our Approach: iTrustPage Prevents users from filling out phishing forms Prevents users from filling out phishing forms  Does not rely on static filters  Users perform simple, common, and intuitive tasks  Doesn’t rely on users to stay vigilent  Harder-to-fool  Stops users whenever key is pressed on any site whether a form is present or not

High-Level View of Our Tool If user fills suspicious form, user asked for input: If user fills suspicious form, user asked for input: 1. Describe search terms for questionable form  i.e., Is the user visiting an well-established site?  If yes, site is unlikely to phish 2. Visual comparison of questionable Web form with Web forms arrived at via Google result  i.e., Do these two forms look visually the same?  If yes, site is likely to phish

Live Demonstration – Trusted Page Navigate to Google and perform a search Navigate to Google and perform a search

Live Demonstration – Untrusted Page

Live Demonstration – Phishing Page

Our Two Key Observations Rely on user input to help disambiguate between legit and fake sites Rely on user input to help disambiguate between legit and fake sites  Certain decision making tasks are hard to automate reliably, yet very easy for people to decide  e.g., deciding when 2 Web sites appear visually similar Use external Web information repositories Use external Web information repositories  Use Internet sources to help determine legitimacy of particular Web site or form  e.g., many attacks target well-known, popular Web sites + search engines can identify such sites

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Automatic Classification iTrustPage stores locally previously visited forms iTrustPage stores locally previously visited forms  No need to re-validate form Two additional conservative heuristics Two additional conservative heuristics  Google’s PageRank >= 5  Must be verified by TrustWatch Heuristics could be exploited by attackers Heuristics could be exploited by attackers  Fundamental trade-off between usability & security

Validation Web form is validated if: Web form is validated if: 1. Our conservative heuristics validate it (automatically) 2. Form’s domain in top 10 domains from Google  Based on user-input keywords 3. Repeat step 2 k-times, refining search keywords  Where k is variable depending on form’s PageRank  Higher PageRank means lower k 4. When everything else fails, raise flashy warning box  Fundamental corner-case, common to all tools

Implementation 5,200 lines of code for Firefox extension 5,200 lines of code for Firefox extension  Tested with Linux, Mac, Windows  Open-source, freely available 900 downloads in one month 900 downloads in one month Recently released ver. 2.0 with better interface Recently released ver. 2.0 with better interface  It still needs lots of work though

Circumventing iTrustPage Create phishing page on site with high PageRank Create phishing page on site with high PageRank 1. Break into popular site 2. “Google bomb” attack Compromise user’s Web browser Compromise user’s Web browser  In this case, all bets are off (spyware!)

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Outline Motivating the need for new approaches Motivating the need for new approaches Lessons learned from current approaches Lessons learned from current approaches iTrustPage demo iTrustPage demo Design and implementation Design and implementation Evaluation Evaluation Conclusions Conclusions

Evaluation Strategy 1. Performance evaluation 2. Evaluating iTrustPage’s effectiveness 3. Usability study

Evaluation Strategy 1. Performance evaluation 2. Evaluating iTrustPage’s effectiveness 3. Usability study

Methodology Would users notice a performance degradation? Would users notice a performance degradation?  iTrustPage prefetches PageRank and TrustWatch Load pages of randomly chosen 115 US banks Load pages of randomly chosen 115 US banks Average PC: P III, 256MB RAM, U of T network Average PC: P III, 256MB RAM, U of T network Compare page loading times of unmodified browser to browser+iTrustPage Compare page loading times of unmodified browser to browser+iTrustPage

Very Little Additional Overhead Average site has 27ms extra overhead

Evaluation Strategy 1. Performance evaluation 2. Evaluating iTrustPage’s effectiveness 3. Usability study

Questions Are automatic validation heuristics correct? Are automatic validation heuristics correct? How often do users need to validate forms? How often do users need to validate forms? For hard-to-validate forms, how often do users need to revise search terms? For hard-to-validate forms, how often do users need to revise search terms?

Questions Are automatic validation heuristics correct? Are automatic validation heuristics correct? How often do users need to validate forms? How often do users need to validate forms? For hard-to-validate forms, how often do users need to revise search terms? For hard-to-validate forms, how often do users need to revise search terms?

Methodology Can’t measure from iTrustPage’s deployment Can’t measure from iTrustPage’s deployment  We do not record number of forms visited by users Use previously collected traces of Websites Use previously collected traces of Websites  Research log: 14 research lab users over 3.5 months  IRCache log: 8,714 users over 6.5 months Assume all pages have forms Assume all pages have forms

40% Sites are Automatically Validated

Users are Disrupted Less over Time This data is from iTrustPage’s deployment

Evaluation Strategy 1. Performance evaluation 2. Evaluating iTrustPage’s effectiveness 3. Usability study

Methodology 4-step study: 4-step study:  Fill-out preliminary survey to gather background info  Present tutorial on iTrustPage  Ask users to perform six steps, including:  Visit popular legit form  Visit unpopular legit form, could be easily found on Google  Visit phishing site  Visit unpopular legit form, can’t be found on Google  Post-study questionnaire 15 participants 15 participants

More disruptions, less easy to use!

Security vs. Usability

Conclusions New anti-phishing tool based on two insights New anti-phishing tool based on two insights  User input can be used to distinguish legit from fake sites, as long as interaction is simple and intuitive  Internet information repositories can be used to assist user with their decision Our evaluation has shown: Our evaluation has shown:  Negligible performance overhead  Automatic classification heuristics correct and useful  Tool becomes less disruptive over time  User like tool when few disruptions only

Works Surprisingly Well Download iTrustPage (Firefox Extension) Download iTrustPage (Firefox Extension) 