Security and identification indicators for browsers against spoofing and phishing attacks
- 1 September 2008
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Internet Technology
- Vol. 8 (4) , 1-36
- https://doi.org/10.1145/1391949.1391950
Abstract
In spite of the use of standard Web security measures (SSL/TLS), users enter sensitive information such as passwords into fake Web sites. Such fake sites cause substantial damages to individuals and corporations. In this work, we identify several vulnerabilities of browsers, focusing on security and identification indicators. We present improved security and identification indicators, as we implemented in TrustBar, a browser extension we developed. With TrustBar, users can assign a name or logo to identify SSL/TLS-protected sites; if users did not assign a name or logo, TrustBar identifies protected sites by the name or logo of the site, and by the certificate authority (CA) who identified the site. We present usability experiments which compared TrustBar's indicators to the basic indicators available in most browsers (padlock, URL, and https prefix), and some relevant secure-usability principles.Keywords
Funding Information
- Israel Science Foundation (ISF 298/03-10.5)
- National Science Foundation (NSF CCR 03-14161)
This publication has 18 references indexed in Scilit:
- An Evaluation of Extended Validation and Picture-in-Picture Phishing AttacksPublished by Springer Nature ,2007
- Why phishing worksPublished by Association for Computing Machinery (ACM) ,2006
- Trusted paths for browsersACM Transactions on Information and System Security, 2005
- Modeling and Preventing Phishing AttacksPublished by Springer Nature ,2005
- Client-side caching for TLSACM Transactions on Information and System Security, 2004
- Payments and banking with mobile personal devicesCommunications of the ACM, 2003
- The homograph attackCommunications of the ACM, 2002
- Risks of the Passport single signon protocolComputer Networks, 2000
- GUI bloopers (book excerpt)Ubiquity, 2000
- Trusting mobile user devices and security modulesComputer, 1997