CMU Usable Privacy and Security Laboratory
Trust and Semantic Attacks - II
Ponnurangam Kumaraguru
Computation, Organizations and Society Carnegie Mellon University Feb 23rd 2006 ponguru@cs.cmu.edu http://www.cs.cmu.edu/~ponguru/
Ponnurangam Kumaraguru Computation, Organizations and Society - - PowerPoint PPT Presentation
Trust and Semantic Attacks - II Ponnurangam Kumaraguru Computation, Organizations and Society Carnegie Mellon University Feb 23 rd 2006 ponguru@cs.cmu.edu http://www.cs.cmu.edu/~ponguru/ CMU Usable Privacy and Security Laboratory Outline
CMU Usable Privacy and Security Laboratory
Computation, Organizations and Society Carnegie Mellon University Feb 23rd 2006 ponguru@cs.cmu.edu http://www.cs.cmu.edu/~ponguru/
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 2
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 3
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 4
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 5
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 6
http://www.schneier.com/essay-035.html
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 7
Lance James. Phishing Exposed
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 8
http://groups.csail.mit.edu/uid/projects/phishing/proposal.pdf
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 9
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 10
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 11
Link in e-mail message directs the user to a web
E-mails sent to people on selected lists or to any list
“Phishing kit"
From Computer Desktop Encyclopedia, http://www.computerlanguage.com/
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 12
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 13
“Successful phishing depends on a discrepancy between
“Phishing is a form of online identity theft that employs
“…the act of sending a forged e-mail (using a bulk mailer)
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 14
Over 16,000 unique phishing attacks reported in Nov.
“Illegal access to checking accounts, often gained via
Additional losses due to consumer fears
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 15
http://apwg.org/reports/apwg_report_DEC2005_FINAL.pdf
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 16
http://apwg.org/reports/apwg_report_DEC2005_FINAL.pdf
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 17
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 18
Lack of knowledge
Visual deception
Bounded attention
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 19
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 20
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 21
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 22
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 23
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 24
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 25
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 26
Displays domain registration date, hosting name and
Traps suspicious URLs with deceivable characters Enforces display of browser navigational controls
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 27
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 28
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 29
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 30
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 31
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 32
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 33
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 34
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 35
User type Vulnerability Geek Low Low Medium High Expert Savvy Novice
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 36
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 37
http://www.millersmiles.co.uk/ http://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf http://www.simson.net/ref/2006/CHI-security-toolbar-final.pdf http://www.sims.berkeley.edu/~rachna/papers/why_phishing_works.p
df
http://www.cs.berkeley.edu/~tygar/papers/Phishing/Phish_and_HIPs.
http://www.spoofstick.com/ http://toolbar.netcraft.com/ http://trustbar.mozdev.org/ http://pages.ebay.com/ebay_toolbar/ http://crypto.stanford.edu/SpoofGuard/
ecurity Laboratory • PK • http:/ / www.cs.cmu.edu/ ~ponguru 38