PhorceField: a phish-proof password ceremony

M. Hart, C. Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson
{"title":"PhorceField: a phish-proof password ceremony","authors":"M. Hart, C. Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson","doi":"10.1145/2076732.2076755","DOIUrl":null,"url":null,"abstract":"Many widely deployed phishing defense schemes, such as SiteKey, use client-side secrets to help users confirm that they are visiting the correct website before entering their passwords. Unfortunately, studies have demonstrated that up to 92% of users can be convinced to ignore missing client-side secrets and enter their passwords into phishing pages. However, since client-side secrets have already achieved industry acceptance, they are an attractive building block for creating better phishing defenses. We present PhorceField, a phishing resistant password ceremony that combines client-side secrets and graphical passwords in a novel way that provides phishing resistance that neither achieves on its own. PhorceField enables users to login easily, but forces phishers to present victims with a fundamentally unfamiliar and onerous user interface. Victims that try to use the phisher's interface to enter their password find the task so difficult that they give up without revealing their password. We have evaluated PhorceField's phishing resistance in a user study in which 21 participants used PhorceField for a week and were then subjected to a simulated phishing attack. On average, participants were only able to reveal 20% of the entropy in their password, and none of them revealed their entire password. This is a substantial improvement over previous research that demonstrated that 92% of users would reveal their entire password to a phisher, even if important security indicators were missing[27].\n PhorceField is easy to deploy in sites that already use client-side secrets for phishing defense -- it requires no client-side software and can be implemented entirely in javascript. Banks and other high value websites could therefore deploy it as a drop-in replacement for existing defenses, or deploy it on an \"opt-in\" basis, as Google has done with its phone-based \"2-step verification\" system.","PeriodicalId":397003,"journal":{"name":"Asia-Pacific Computer Systems Architecture Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia-Pacific Computer Systems Architecture Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2076732.2076755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

Many widely deployed phishing defense schemes, such as SiteKey, use client-side secrets to help users confirm that they are visiting the correct website before entering their passwords. Unfortunately, studies have demonstrated that up to 92% of users can be convinced to ignore missing client-side secrets and enter their passwords into phishing pages. However, since client-side secrets have already achieved industry acceptance, they are an attractive building block for creating better phishing defenses. We present PhorceField, a phishing resistant password ceremony that combines client-side secrets and graphical passwords in a novel way that provides phishing resistance that neither achieves on its own. PhorceField enables users to login easily, but forces phishers to present victims with a fundamentally unfamiliar and onerous user interface. Victims that try to use the phisher's interface to enter their password find the task so difficult that they give up without revealing their password. We have evaluated PhorceField's phishing resistance in a user study in which 21 participants used PhorceField for a week and were then subjected to a simulated phishing attack. On average, participants were only able to reveal 20% of the entropy in their password, and none of them revealed their entire password. This is a substantial improvement over previous research that demonstrated that 92% of users would reveal their entire password to a phisher, even if important security indicators were missing[27]. PhorceField is easy to deploy in sites that already use client-side secrets for phishing defense -- it requires no client-side software and can be implemented entirely in javascript. Banks and other high value websites could therefore deploy it as a drop-in replacement for existing defenses, or deploy it on an "opt-in" basis, as Google has done with its phone-based "2-step verification" system.
PhorceField:一个防网络钓鱼密码仪式
许多广泛部署的网络钓鱼防御方案,如SiteKey,使用客户端秘密来帮助用户在输入密码之前确认他们正在访问正确的网站。不幸的是,研究表明,高达92%的用户可以被说服忽略丢失的客户端机密,并将密码输入网络钓鱼页面。然而,由于客户端机密已经获得了业界的认可,因此它们是创建更好的网络钓鱼防御的有吸引力的构建块。我们介绍了PhorceField,这是一个防网络钓鱼的密码仪式,它以一种新颖的方式结合了客户端秘密和图形密码,提供了一种单独无法实现的防网络钓鱼功能。PhorceField使用户能够轻松登录,但却迫使钓鱼者向受害者呈现一个根本不熟悉且繁重的用户界面。试图使用网络钓鱼者界面输入密码的受害者发现任务非常困难,以至于他们在没有泄露密码的情况下放弃了任务。我们在一项用户研究中评估了PhorceField的网络钓鱼抗性,其中21名参与者使用PhorceField一周,然后遭受模拟的网络钓鱼攻击。平均而言,参与者只能透露密码中20%的熵值,而且没有人透露整个密码。与之前的研究相比,这是一个很大的进步,之前的研究表明,即使缺少重要的安全指标,92%的用户也会向网络钓鱼者泄露他们的全部密码[27]。PhorceField很容易部署在已经使用客户端秘密进行网络钓鱼防御的站点中——它不需要客户端软件,可以完全用javascript实现。因此,银行和其他高价值网站可以将其部署为现有防御的替代方案,或者在“选择加入”的基础上部署它,就像谷歌在其基于手机的“两步验证”系统中所做的那样。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信