Web Browser Privacy & Security
Fan Du
CMSC 818D Class Presentation 4/16/2015
1
Web Browser Privacy & Security Fan Du CMSC 818D Class - - PowerPoint PPT Presentation
Web Browser Privacy & Security Fan Du CMSC 818D Class Presentation 4/16/2015 1 Outline Q1: How to Prevent Web Tracking ? Q2: How to Opt Out Online Behavioral Advertising ? Q3: How to Design Phishing Websites ? 2 Outline
Fan Du
CMSC 818D Class Presentation 4/16/2015
1
2
3
4
source: www.addthis.com
5
source: Facebook, Google, Twitter, Linkedin
6
source: Facebook, Google, Twitter, Linkedin
Your habits Your politics opinion Your browsing history Your identity
source: TL - Facebook, TR - http://iptv-work.at.ua, BL - http://pixshark.com/timeline-clipart-for-kids.htm, BR - CNN
source: Facebook, Google, Twitter, Linkedin, http://www.gunslot.com/pictures/re-imagined-facebook-button
source: Roesner, Franziska, et al. "Sharemenot: Balancing privacy and functionality of third-party social widgets." Usenix (2012).
10
source: Roesner, Franziska, et al. "Sharemenot: Balancing privacy and functionality of third-party social widgets." Usenix (2012).
11
source: Roesner, Franziska, et al. "Sharemenot: Balancing privacy and functionality of third-party social widgets." Usenix (2012).
12
source: http://pixgood.com/facebook-cookies.html
13
source: http://amqueretaro.com/fotogalerias/2014/04/20/fotos-ir-en-contra-de-las-reglas-nunca-fue-tan-divertido
14
source: http://i.kinja-img.com/gawker-media/image/upload/s--xGcq1y03--/ c_fit,fl_progressive,q_80,w_636/18rc5mwoft1d3jpg.jpg
15
source: sharemenot.cs.washington.edu
16
source: sharemenot.cs.washington.edu
17
1. Identify HTTP requests for tracker buttons 2. Block the requests and insert replacement buttons 3. When users click the buttons, load the actual widget 4. Users need to click again to trigger the “like” function
source: sharemenot.cs.washington.edu
18
source: sharemenot.cs.washington.edu
19
source: sharemenot.cs.washington.edu
20
source: CNN
21
Top 20 Social Widgets # of Top Domains
source: Roesner, Franziska, et al. "Sharemenot: Balancing privacy and functionality of third-party social widgets." Usenix (2012).
22
Tracker Without ShareMeNot With ShareMeNot Facebook 154 9 Google 149 15 Twitter 93 AddThis 34 YouTube 30 LinkedIn 22 Digg 8 Stumbleupon 6
source: Roesner, Franziska, et al. "Sharemenot: Balancing privacy and functionality of third-party social widgets." Usenix (2012).
23
source: http://adsoftheworld.com/sites/default/files/media-vimeo/70533052.jpg
24
source: sharemenot.cs.washington.edu
Behavioral Advertising
25
Your habits Your politics opinion Your browsing history Your identity
Social Widgets
source: TL - Facebook, TR - http://iptv-work.at.ua, BL - http://pixshark.com/timeline-clipart-for-kids.htm, BR - CNN
27
Your habits Your politics opinion Your browsing history Your identity
Social Widgets
source: TL - Facebook, TR - http://iptv-work.at.ua, BL - http://pixshark.com/timeline-clipart-for-kids.htm, BR - CNN, CENTER - http://www.gunslot.com/pictures/re-imagined-facebook-button
28
Social Widgets
source: http://adsoftheworld.com/media/print/dicks_sporting_goods_nike_cleat, http://s.petrolicious.com/2015/ vintage-friday/01-jan/Mens%20Shaving%20Posters/vf-mens-shaving-posters-6.jpg, http://www.ideyab.com/ images/contents/0123230525-galleries.jpg
– 87% participants of a 2009 study (Turow et al.)
29
– 64% participants of a 2009 study (Turow et al.)
30
31
source: www.privacyfix.com/start/install
32
source: FireFox
33
source: AdBlockPlus
34
source: Leon, Pedro, et al. "Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012.
35
source: Leon, Pedro, et al. "Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012.
36
source: Leon, Pedro, et al. "Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2012.
37
source: AdBlockPlus
38
source: FireFox
39
source: AdBlockPlus
40
source: http://habrahabr.ru/hub/javascript/page7/
41
source: http://facebookcommentimages.com/wp-content/uploads/2014/01/like.png
42
source: FireFox
43
source: https://www.eff.org/files/images_insert/april_11_copy.png
45
source: https://www.thesslstore.com/images/img-green-addressbar.png
46
source: https://www.eff.org/files/images_insert/april_11_copy.png
47
48
source: Dhamija, Rachna, J. Doug Tygar, and Marti Hearst. "Why phishing works." Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 2006.
– Senario
“Imagine that you receive an email message that asks you to click on one of the following
link to see if it is legitimate website or a spoof”
49
source: Dhamija, Rachna, J. Doug Tygar, and Marti Hearst. "Why phishing works." Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 2006.
security indicators
with popup warnings
are all not significantly correlated with vulnerability to phishing
50
source: Dhamija, Rachna, J. Doug Tygar, and Marti Hearst. "Why phishing works." Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM, 2006.
51