Poster: Preventing SSLstripping Attack using Visual Security Cues
نویسندگان
چکیده
The Secure Socket Layer (SSL) protocol has been the most widely used security mechanism enabling safe web browsing. A new attack, called SSLstripping, reported by Moxie Malinspike at the Blackhat conference in 2009 [2], effectively defeats the SSL security by exploiting either users’ browsing habits or websites’ SSL policy, rather than a technological flaw in the protocol. For the former, most users do not write in the address bar the full address of a website that they want to visit securely, instead relying on their browser and the website to redirect them to a proper secure location. For the latter, many websites do not support SSL by default, only having login forms use a secure connection. As a type of man-in-the-middle (MITM) attack, the SSLstripping attack has the potential to affect tens of millions of online users that login to those websites protected by SSL. Facebook.com is one of the vulnerable websites. Two solutions have been proposed that could be used to address the SSLstripping attack. The first one, ForceHTTPS [1] makes the websites notify a user’s web browser that they require a secure connection to operate, and therefore the browser will always establish a secure connection with those websites that required so. The problem is that many websites do not require HTTPS, and if the attack is launched before the website is first contacted, the browser will never get the notification. Another solution, HProxy [3] relies on the browser’s history information to compare the current and past security mechanisms used by a website already visited. Once again, this solution will not work if the attack is deployed before a browsing history is established or if the history does not exist. We present a novel approach to addressing the SSLstripping attack through the use of visually augmented security. Motivated by the design of typical traffic lights, we introduce a set of visual cues aimed at thwarting the attack. The visual cues can be used to boost the user’s trust against her browser when sensitive credentials need to be entered and submitted to websites for the purpose of authentication. Our contributions are as follows: we propose visual cue based solutions that help address the SSLstriping attack; we propose a better solution to inform users about websites that request sensitive login credentials through an insecure channel by design. Users can then be constantly aware of websites with secure and insecure login, and make informed decisions on how they choose and use their credentials; and we also conduct a user study to explore whether our approach is more effective and promising than the existing pop-up method. 2. APPROACH
منابع مشابه
Integration of image quality and motion cues for face anti-spoofing: A neural network approach
Many trait-specific countermeasures to face spoofing attacks have been developed for security of face authentication. However, there is no superior face anti-spoofing technique to deal with every kind of spoofing attack in varying scenarios. In order to improve the generalization ability of face anti-spoofing approaches, an extendable multi-cues integration framework for face anti-spoofing usin...
متن کاملThe Dark Side of Open Data
We present a poster about a possible cyber-crime attack scenario based on data sciences, social engineering and open data. We want to raise awareness about dangers associated with the use of knowledge discovery techniques applied to open data by cyber-criminals. We hope this poster will spark interest in the topic.
متن کاملA particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
متن کاملCounting clicks and beeps: Exploring numerosity based haptic and audio PIN entry
Haptic and audio cues now appear commonly in computer interfaces, partially due to inherent advantages such as their support for eyes-free interaction. Their invisible, unobservable nature also makes them ideal candidates for security interfaces in which users have to enter secret information such as passwords. In particular, researchers have explored this idea through the design of PIN entry a...
متن کاملPoster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience
CAPTCHAs are an important security tool for preventing automated attacks against online systems. However, they can be an undesirable source of friction in the user experience. In this poster, we propose a novel approach to dynamically improve the CAPTCHA experience for users by individually learning which types of CAPTCHA tests each user is best at solving and adapting future tests presented ba...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011