Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1060745.1060817acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

Hardening Web browsers against man-in-the-middle and eavesdropping attacks

Published: 10 May 2005 Publication History

Abstract

Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, the browser typically allows the user to view and install the certificate and connect to the site despite the verification failure. However, few users understand the risk of man-in-the-middle attacks and the principles behind certificate-based authentication. We propose context-sensitive certificate verification (CSCV), whereby the browser interrogates the user about the context in which a certificate verification error occurs. Considering the context, the browser then guides the user in handling and possibly overcoming the security error. We also propose specific password warnings (SPW) when users are about to send passwords in a form vulnerable to eavesdropping. We performed user studies to evaluate CSCV and SPW. Our results suggest that CSCV and SPW can greatly improve Web browsing security and are easy to use even without training. Moreover, CSCV had greater impact than did staged security training.

References

[1]
Ackerman, M. and Cranor, L.: Privacy Critics: UI Components to Safeguard Users' Privacy. In Proc. Conf. Human Factors in Computing Systems (CHI'99), Extended Abstracts, ACM, 1999, pp. 258-259. {Online} http://lorrie.cranor.org/pubs/privacy-critics.pdf]]
[2]
Adams, A. and Sasse, M.: Users are not the Enemy. In Communications of the ACM, 42(12):41--46, Dec. 1999.]]
[3]
Anderson, R.: Why Cryptosystems Fail. In Proc. 1st Conf. Computer and Communications Security (CCS'93), ACM, 1993, pp. 215--227. {Online} http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf]]
[4]
Boneh, D. and Franklin, M.: Identity Based Encryption from the Weil Pairing, in J. of Computing, SIAM, 32(3):586--615, 2003. {Online} http://crypto.stanford.edu/~dabo/papers/ibe.pdf]]
[5]
Carroll, J. and Carrithers, C.: Training Wheels in a User Interface. In Communications of the ACM, 27(8):800--806, 1984.]]
[6]
Collins, J., Greer, J., Kumar, V., McCalla, G., Meagher, P. and Tkatch, R.: Inspectable User Models for Just-In-Time Workplace Training. In Proc. 6th International Conference on User Modeling (UM97). {Online} http://www.cs.uni-sb.de/UM97/ps/CollinsJA.ps]]
[7]
Dierks, T. and Allen, C.: The TLS Protocol Version 1.0. RFC 2246, IETF, Jan. 1999. {Online} ftp://ftp.rfc-editor.org/in-notes/rfc2246.txt]]
[8]
ethereal. {Online} http://www.ethereal.com/]]
[9]
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and Berners-Lee, T.: Hypertext Transfer Protocol -- HTTP/1.1. RFC 2616, IETF, June 1999. {Online} ftp://ftp.rfc-editor.org/in-notes/rfc2616.txt]]
[10]
Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., and Stewart, L.: HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, IETF, June 1999. {Online} ftp://ftp.rfc-editor.org/in-notes/rfc2617.txt]]
[11]
Freier, A., Karlton, P., and Kocher, P.: The SSL Protocol Version 3.0. {Online} http://wp.netscape.com/eng/ssl3/draft302.txt]]
[12]
Guzdial, M.: Software-Realized Scaffolding to Facilitate Programming for Science Learning. In Interactive Learning Environments, 4(1):1--44. {Online} http://guzdial.cc.gatech.edu/Emile-ILE.pdf]]
[13]
Hommel, G.: A Comparison of Two Modified Bonferroni Procedures. In Biometrika, 76:624-625, 1989.]]
[14]
Housley, R., Ford, W., Polk, W. and Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, IETF, Jan. 1999. {Online} ftp://ftp.rfc-editor.org/in-notes/pdfrfc/rfc2459.txt.pdf]]
[15]
Lonvick, C.: SSH Protocol Architecture. Internet Draft, IETF, Oct. 2004. {Online} ftp://ftp.rfc-editor.org/in-notes/internet-drafts/draft-ietf-secsh-architecture-17.txt]]
[16]
Millett, L., Friedman, B. and Felten, E.: Cookies and Web Browser Design: Toward Realizing Informed Consent Online. In Proc. Conference on Human Factors in Computing Systems (CHI'2001), ACM, Mar. 2001. {Online} ftp://ftp.cs.washington.edu/tr/2000/12/UW-CSE-00-12-03.pdf]]
[17]
National Institute of Standards and Technology. Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. Nov. 2001. {Online} http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf]]
[18]
National Institute of Standards and Technology. Specifications for Secure Hash Standard. Federal Information Processing Standards Publication 180-1. Apr. 1995. {Online} http://www.itl.nist.gov/fipspubs/fip180-1.htm]]
[19]
Open1x. {Online} http://www.open1x.org/]]
[20]
Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G. and Josefsson, S.: Protected EAP Protocol (PEAP) Version 2. Internet Draft, IETF, Oct. 2004. {Online} ftp://ftp.rfc-editor.org/in-notes/internet-drafts/draft-josefsson-pppext-eap-tls-eap-10.txt]]
[21]
Perrin, T.: Public Key Distribution Through "CryptoIDs". In Proc. Workshop on New Security Paradigms. ACM, 2003, pp. 87--102. {Online} http://trevp.net/cryptoID/cryptoID.pdf]]
[22]
Rivest, R., Shamir, A., and Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM 21,2 (Feb. 1978), 120--126.]]
[23]
Sandhu, R.: Good-Enough Security: Toward a Pragmatic Business-Driven Discipline. In Internet Computing, IEEE, vol. 7, no. 1, Jan. 2003. {Online} http://www.list.gmu.edu/journals/ic/03-sandhu-good.pdf]]
[24]
Sankoh, A., Huque, M. and Dubey, S.: Some Comments on Frequently Used Multiple Endpoint Adjustment Methods in Clinical Trials. In Statistics in Medicine, 16:2529--2542, 1997.]]
[25]
Shmoo. airsnarf. {Online} http://airsnarf.shmoo.com/]]
[26]
Smetters, D.K. and Grinter, R.E.: Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications. In Proc. Workshop on New Security Paradigms, ACM, 2002.]]
[27]
Smith, S.: Humans in the Loop: Human-Computer Interaction and Security. In Security and Privacy, IEEE, May/June 2003, 75--79. {Online} http://www.cs.dartmouth.edu/~sws/papers/humans.pdf]]
[28]
Song, D. dsniff. {Online} http://naughty.monkey.org/~dugsong/dsniff/]]
[29]
Whitten, A. and Tygar, J.D.: Why Johnny Can't Encrypt: A Case Study. In Proceedings of Usenix Security Symposium, Aug. 1999. {Online} http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.ps]]
[30]
Whitten, A. and Tygar, J.D.: Safe Staging for Computer Security. In Proceedings of the Workshop on Human-Computer Interaction and Security Systems, CHI'2003, April 2003. {Online} http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-whitten.pdf]]
[31]
Whitten, A.: Making Security Usable. Tech Report CMU-CS-04-135 (Ph.D. dissertation), School of Computer Science, Carnegie Mellon University, May 2004.]]
[32]
Wi-Fi Alliance. Wi-Fi Protected Access 2. {Online} http://www.weca.net/OpenSection/protected_access.asp?]]
[33]
Yan, J., Blackwell, A., Anderson, R., and Grant, A.: The Memorability and Security of Passwords -- Some Empirical Results. Tech. Report UCAM-CL-TR-500, University of Cambridge Computer Laboratory, Sept. 2000. {Online} http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/tr500.pdf]]
[34]
Rescorla, E.: HTTP over TLS. RFC 2818, IETF, May 2000. {Online} ftp://ftp.rfc-editor.org/in-notes/rfc2818.txt]]
[35]
tcpdump. {Online} http://www.tcpdump.org/]]
[36]
Xia, H. and Brustoloni, J.: Detecting and Blocking Unauthorized Access in Wi-Fi Networks. In Proc. Networking'2004, IFIP, Lecture Notes in Computer Science, 3042:795-806, Springer-Verlag, May 2004. {Online} http://www.cs.pitt.edu/~jcb/papers/net2004.pdf]]
[37]
Xia, H. and Brustoloni, J.: Virtual Prepaid Tokens for Wi-Fi Hotspot Access. In Proc. 29th Intl. Conf. Local Computer Networks (LCN), IEEE, Nov. 2004, pp. 232--239. {Online} http://www.cs.pitt.edu/~jcb/papers/lcn2004.pdf]]
[38]
Ye, E., and Smith, S.: Trusted Paths for Browsers. In Proc. Usenix Security Symposium, Aug. 2002. {Online} http://www.cs.dartmouth.edu/~sws/papers/usenix02.pdf]]
[39]
Zurko, M.E. and Simon, R.: User-Centered Security. In Proc. Workshop on New Security Paradigms, ACM, 1996, pp. 27--33.]]

Cited By

View all
  • (2023)A URL-Based Social Semantic Attacks Detection With Character-Aware Language ModelIEEE Access10.1109/ACCESS.2023.324112111(10654-10663)Online publication date: 2023
  • (2019)Automatic Speaker Verification, ZigBee and LoRaWAN: Potential Threats and Vulnerabilities in Smart CitiesResearch & Innovation Forum 201910.1007/978-3-030-30809-4_26(277-285)Online publication date: 29-Oct-2019
  • (2018)"I've got nothing to lose"Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security10.5555/3291228.3291245(197-216)Online publication date: 12-Aug-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '05: Proceedings of the 14th international conference on World Wide Web
May 2005
781 pages
ISBN:1595930469
DOI:10.1145/1060745
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 May 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. HTTPS
  2. SSL
  3. Web browser
  4. certificate
  5. eavesdropping attack
  6. just-in-time instruction
  7. man-in-the-middle attack
  8. password
  9. safe staging
  10. well-in-advance instruction

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A URL-Based Social Semantic Attacks Detection With Character-Aware Language ModelIEEE Access10.1109/ACCESS.2023.324112111(10654-10663)Online publication date: 2023
  • (2019)Automatic Speaker Verification, ZigBee and LoRaWAN: Potential Threats and Vulnerabilities in Smart CitiesResearch & Innovation Forum 201910.1007/978-3-030-30809-4_26(277-285)Online publication date: 29-Oct-2019
  • (2018)"I've got nothing to lose"Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security10.5555/3291228.3291245(197-216)Online publication date: 12-Aug-2018
  • (2016)A Systematic Mapping of Security MechanismsCombating Security Breaches and Criminal Activity in the Digital Sphere10.4018/978-1-5225-0193-0.ch013(209-232)Online publication date: 2016
  • (2015)On the Detection of Fake Certificates via Attribute CorrelationEntropy10.3390/e1706380617:6(3806-3837)Online publication date: 8-Jun-2015
  • (2014)The effect of developer-specified explanations for permission requests on smartphone user behaviorProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2556288.2557400(91-100)Online publication date: 26-Apr-2014
  • (2014)An Investigation of How Businesses Are Highly Influenced by Social Media SecurityMultidisciplinary Social Networks Research10.1007/978-3-662-45071-0_25(311-324)Online publication date: 2014
  • (2013)When it's better to ask forgiveness than get permissionProceedings of the Ninth Symposium on Usable Privacy and Security10.1145/2501604.2501605(1-14)Online publication date: 24-Jul-2013
  • (2013)An intrusion detection and prevention system for IMS and VoIP servicesInternational Journal of Information Security10.1007/s10207-012-0187-012:3(201-217)Online publication date: 1-Jun-2013
  • (2012)CodeShieldProceedings of the 28th Annual Computer Security Applications Conference10.1145/2420950.2420992(279-288)Online publication date: 3-Dec-2012
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media