Client-side defenses against web-based identity theft - PowerPoint PPT Presentation

About This Presentation
Title:

Client-side defenses against web-based identity theft

Description:

https://www.start.earthlink.net/track?billing.asp. Actual link in html email. source:https://start.earthlink.net/track?id=101fe8439 ... – PowerPoint PPT presentation

Number of Views:94
Avg rating:3.0/5.0
Slides: 33
Provided by: danb2
Category:

less

Transcript and Presenter's Notes

Title: Client-side defenses against web-based identity theft


1
Client-side defenses against web-based identity
theft
  • Students Robert Ledesma, Blake Ross, Yuka
    Teraguchi
  • Faculty Dan Boneh and John Mitchell
  • Stanford University
  • PORTIA Project

2
Phishing Attack
Spam email There is a problem with your eBay
account.
3
Sample phishing email
4
How does this lead to spoof page?
  • Link displayed
  • https//www.start.earthlink.net/track?billing.asp
  • Actual link in html email
  • sourcehttps//start.earthlink.net/track?id101fe8
    439
  • 8a866372f999c983d8973e77438a993847183bca43d7
  • ad47e99219a907871c773400b8328898787762curl
  • http//202.69.39.30/snkee/billing.htm?session_i
    d8495...
  • Website resolved to
  • http//202.69.39.30/snkee/billing.htm?session_id8
    495...

5
Spoof page
http//202.69.39.30/snkee/....
6
Magnitude of problem
  • Fastest growing crime on the Internet.
  • Primary targets attacks/month (2004)

July June May Jan
Citibank 682 492 370 34
US Bank 622 251 167 2
eBay 255 285 293 51
http//www.antiphishing.org
7
Properties of Spoof Sites
  • Ask for user input, e.g. password.
  • Some ask for CCN, SSN, mothers maiden name,
  • HTML copied from honest site
  • Contain links to the honest site
  • Logos from honest site. Copied jpg/gif file, or
    link to honest site
  • Can contain revealing mistakes
  • Clever spoof pages contain Javascript to fool
    user.
  • Short lived
  • Blacklisting spoof sites has limited success.
  • HTTPS uncommon

8
  • Thanks!
  • ? Robert Rodriguez
  • Chris Von Holt
  • Alissa Cooper
  • ? Tom Pageler
  • ? Greg Crabb
  • Many more

9
What can we do about phishing?
  • Spam filter
  • Phishing starts with email, so stop it there.
  • Non-trivial phishing emails look like ordinary
    email.
  • Browser-side methods (plug-ins)
  • Detect spoof web site. Warn user.
  • Improve browser password management.
  • Server-side methods
  • Use strong user authentication instead of pwds.
  • Certificates or security tokens.

10
Our project at Stanford
  • Two browser plug-ins available for download
  • SpoofGuard
  • Alerts user when browser is viewing a spoofed web
    page.
  • Uses variety of heuristics to identify spoof
    pages.
  • PwdHash
  • Simple mechanism for improving password
    management by the browser.
  • Will SpoofGuard solve the phishing problem?
  • As likely to end phishing as first virus scanner
    was to end viruses
  • A new type of anomaly detection problem

11
SpoofGuardDetect Phishing Web Sites
http//crypto.stanford.edu/SpoofGuard
12
SpoofGuard Browser Plug-in
  • Compute spoof index
  • Weighted sum of several spoof measures
  • Depends on current page and history
  • Provides two forms of information
  • Passive stoplight in toolbar green, yellow, red
  • Active pop-up when necessary
  • Stop outgoing information to malicious web site
  • Challenges
  • Must be easy for novice users.
  • Detect malicious pages
  • Minimize false alarms

13
Stateless Page Evaluation
  • URL Check
  • Similar to well known site
  • www.ebay-fixit.com
  • www.ebau.com
  • IP address instead of host name
  • http//123.123.123.123/
  • Other tricks
  • www.ebay.com_at_123.123.123.123
  • Use reverse DNS to find domain if IP address
  • Image Check
  • Is image associated with different domain in
    image-domain database

14
Stateless Page Evaluation II
  • Link Check
  • Run URL check on links on the page
  • If significant fraction fail, raise alert
  • Password Check
  • Pages with password field are more suspicious
    than the one without
  • Check for HTTPS and valid certificate

15
Stateful Page Evaluation
  • History Check
  • Site is assumed OK if in users history file
  • Very important for reducing false alarm rate
  • Domain Check
  • Is current domain similar to a domain in the
    history list?
  • Email Check
  • Suspicious if page is referred by email link

16
POST Data Evaluation
  • Intercepts and checks POST data
  • Keep hashed ltdomain, user, passwordgt triples
  • If known user password are sent to different
    domain, raise alert level
  • Exception for search engines
  • High alert warn user and allow to cancel
    operation

17
SpoofGuard User Interface
  • SpoofGuard is added to IE tool bar
  • Traffic light
  • Report green, yellow, red altert level
  • Pop-up as method of last resort

18
Evaluation of SpoofGuard
  • Detect sample spoofs
  • Tested on 12 spoofs from SF ECTF
  • Acceptable false alarm rate
  • Used ourselves for several weeks
  • Can get false alarms on first visit to site
  • SpoofGuard learns which sites you trust
  • Does not popup on subsequent visits
  • Negligible performance impact

But Clever phisher can defeat most tests
19
PwdHash Improved Pwd Mgmt
http//crypto.stanford.edu/PwdHash
20
The common pwd problem
  • Web users use the same username/password at many
    sites.
  • Users use their banking pwd at low security
    sites.
  • The problem break-in to low security site
    reveals banking username/passwords.
  • Ideal solution strong auth. protocols
    (SecureID/PKI)
  • Unlike pwd, requires HW or has limited mobility.

21
A Simple Solution
  • Browser plug-in that converts a users pwd into
    a unique pwd per site.
  • Locate all pwd HTML elements on page ltINPUT
    TYPEpassword NAMEpassgt
  • Whenever focus leaves a password field, replace
    contents of field with HMACpwd(domain-name)
  • Password hash is sent to web site instead of pwd.
  • (some) Protection against phishing
  • Spoof site only sees hash of users pwd.

22
Pwd Hashing an old idea
  • Hash pwd with realm provided by remote site
  • HTTP 1.1 Digest Authentication
  • Kerberos 5
  • Hash pwd with network service name
  • Gabber, Gibbons, Matyas, Mayer FC 96.
    Proxy.
  • Abadi, Bharat, Marais PTO 97
  • Challenge implementing in a modern browser.

23
Plug-in Challenges
  • Pwd reset after plug-in install
  • Javascript attacks
  • What salt to use in hash?
  • How to encode resulting hash?
  • When to compute hash?
  • Internet CafĂ©
  • Dictionary attacks
  • Design goal transparent to user.

24
Problem 1 pwd reset
  • After install, requires users to reset their
    pwds.
  • On pwd reset page, plug-in must not hash old pwd.
  • Plug-in identifies pwd reset page as having
    three pwd fields.
  • Plug-in does not hash first pwd field. (turns
    blue)
  • Plug-in remembers to hash all pwd fields on
    future invocations of this reset page
  • To disable/toggle hashing double-click in pwd
    field.
  • Problem phishers could create a spoof pwd reset
    page and obtain pwds in the clear.
  • Plug-in warns user when it sends pwd un-hashed.

25
Problem 2 Cafes
  • Users cannot install plug-in at Internet Cafes.
  • We provide a web site for remote
    hashing http//crypto.stanford.edu/PwdHash/
  • Hash computed in Javascript.
  • Resulting hash copied into clipboard.

26
Problem 3 Javascript attacks
  • Malicious site can create Javascript to steal
    users unhashed password.
  • Record all key-strokes sent to page
  • Change target-domain-name on submit
  • Mask regular text field as a password field
  • Even worse as each keystroke is typed into
    field, send to evil site. (?)

27
Javascript attacks (cont.)
  • Defense 1 Keyboard intercept.
  • System traps all keyboard events to window.
  • If keystroke intended for pwd field, replace with
  • Browser never sees pwd.
  • On BeforeNavigate2 event, replace in POST
    data with hashed pwd.
  • Defense 2 key-stream monitor.
  • System records all passwords user types (hashed).
  • System traps all keyboard events to window.
  • If key-stream ever contains a pwd not in pwd
    field, alert user.

28
Problem 4 what salt to use?
  • For few sites, domain of pwd reset page ?
    domain of pwd use pagepassport reset page
    services.passport.netpassport use page
    login.passport.net
  • Incorrect pwd-hash is registered at site.
  • Config file tells plug-in what salt to use and
    how to encode hash
  • ltpwdhash domain.com tail2 encode1gt
  • ltpwdhash domain.co.uk tail3 encode1gt

29
Problem 5 Dictionary attacks
  • Main point low security site never sees users
    pwd.
  • Dictionary attacks
  • After phishing or break-in to low security
    site,attacker obtains pwd hashes.
  • Attacker can attempt dictionary attack on hashes.
  • Succeeds on ? 15 of pwds (unlike 100
    today)
  • Fundamental limitation of pwd authentication.
    Unavoidable when users key is low-entropy.
  • Defense plug-in enables user to specify a
    global plug-in pwd used to strengthen all pwd
    hashes.
  • Defense against dict. attacks for savvy users.

30
Alternative designs
  • Better security against Javascript attacks
  • Modify pwd UI 1. User hits ctrl-P in password
    field.
  • 2. Plug-in displays password dialog box.
  • 3. User enters password into dialog box.
  • Plug-in embeds hashed-pwd directly into
    out-going POST data. (BeforeNavigate2
    event)
  • Javascript on page cant see pwd and cannot spoof
    dialog box.
  • Downside confusing to users.
  • Better salt for pwd Get salt from SSL
    certificate.
  • Not possible with current plug-in support in IE.
  • Microsoft could do this

31
Try it out!
  • Plug-ins continue to evolve and improve
  • Easier deployment and use.
  • Proxy-based solutions (not browser plug-ins)
  • Strengthen spoof page identification.
  • Deployment through Mozilla and billeo.
  • http//crypto.stanford.edu/SpoofGuard

32
crypto.stanford.edu/SpoofGuard
Write a Comment
User Comments (0)
About PowerShow.com