Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1143120.1143126acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Passpet: convenient password management and phishing protection

Published: 12 July 2006 Publication History
  • Get Citation Alerts
  • Abstract

    We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple accounts by turning a single memorized password into a different password for each account. User-assigned site labels (petnames) help users securely identify sites in the face of determined attempts at impersonation (phishing). Password-strengthening measures defend against dictionary attacks. Customizing the user interface defends against user-interface spoofing attacks. We propose new improvements to these techniques, discuss how they are integrated into a single tool, and compare Passpet to other solutions for managing passwords and preventing phishing.

    References

    [1]
    M. Abadi, T. M. A. Lomas, and R. Needham. Strengthening Passwords. Technical Report 1997-033, SRC, 2005.
    [2]
    T. Close. Petname Tool. http://petname.mozdev.org/.
    [3]
    CoreStreet. Spoofstick. http://www.spoofstick.com/.
    [4]
    R. Dhamija and J. D. Tygar. The battle against phishing: Dynamic Security Skins. In Proc. 2005 Symposium on Usable Privacy and Securtiy, pages 77--88, 2005.
    [5]
    R. Dhamija, J. D. Tygar, and M. Hearst. Why Phishing Works. In Proc. CHI 2006 Conference on Human Factors in Computing Systems, 2006.
    [6]
    Earthlink. Earthlink Toolbar and ScamBlocker FAQ. http://kb.earthlink.net/case.asp?article=30492.
    [7]
    Earthlink. Earthlink Toolbar Featuring ScamBlocker for Windows Users. http://www.earthlink.net/software/free/toolbar/.
    [8]
    S. Fox, L. Rainie, J. Horrigan, A. Lenhart, T. Spooner, and C. Carter. Trust and privacy online: Why Americans want to rewrite the rules. August 2000. http://www.pewinternet.org/report_display.asp?r=19.
    [9]
    R. Franco. Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers. November 2005. http://blogs.msdn.com/ie/archive/2005/11/21/495507.aspx.
    [10]
    E. Gabber, P. B. Gibbons, Y. Matias, and A. Mayer. How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In Proc. Financial Cryptography 1997. Springer-Verlag, February 1997.
    [11]
    E. Gabrilovich and A. Gontmakher. The Homograph Attack. Comm. of the ACM, 45(2):128, February 2002.
    [12]
    J. A. Halderman, B. Waters, and E. W. Felten. A Convenient Method for Securely Managing Passwords. In Proc. 14th International World-Wide Web Conference, 2005. http://www.cs.princeton.edu/~jhalderm/projects/password/.
    [13]
    A. Herzberg and A. Gbara. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. Cryptology ePrint Archive, Report 2004/155, 2004. http://www.cs.biu.ac.il/~herzbea/TrustBar/.
    [14]
    A. Karp. Site-Specific Passwords. Technical report, HP Labs. http://www.hpl.hp.com/personal/Alan_Karp/site_password/.
    [15]
    J. Kelsey, B. Schneier, C. Hall, and D. Wagner. Secure Applications of Low-Entropy Keys. Lecture Notes in Computer Science, 1396, 121--134, 1998.
    [16]
    R. Naraine. Microsoft Downgrades Claria Adware Detections. July 2005. http://www.eweek.com/article2/0,1895,1834607,00.asp.
    [17]
    Netcraft. Netcraft Anti-Phishing Toolbar. http://toolbar.netcraft.com/.
    [18]
    Netcraft. Netcraft Toolbar Privacy Policy. http://toolbar.netcraft.com/privacypolicy.html.
    [19]
    Bank of America. Sign up for the SiteKey Service. http://www.bankofamerica.com/privacy/passmark/.
    [20]
    B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger Password Authentication Using Browser Extensions. In Proc. 14th Usenix Security, 2005.
    [21]
    T. Sharif. Phishing Filter in IE7. September 2005. http://blogs.msdn.com/ie/archive/2005/09/09/463204.aspx.
    [22]
    M. Stiegler. An Introduction to Petname Systems. http://www.skyhunter.com/marcs/petnames/IntroPetNames.html.
    [23]
    Protocom Development Systems. Global Password Usage Survey. September 2003. http://www.protocom.com/html/whitepapers/biz_password_survey.html.
    [24]
    T. Wu. The Secure Remote Password Protocol. In Proc. 1998 Internet Society Network and Distributed System Security Symposium, pages 97--111, March 1998.

    Cited By

    View all
    • (2024)Design and FPGA Implementation of a Password Management System Utilizing RO PUF2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)10.1109/AINIT61980.2024.10581776(303-307)Online publication date: 29-Mar-2024
    • (2023)Password Manager with Multi-Factor Authentication2023 International Conference on Networking and Communications (ICNWC)10.1109/ICNWC57852.2023.10127424(1-5)Online publication date: 5-Apr-2023
    • (2023)Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions2023 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)10.1109/ESEM56168.2023.10304861(1-12)Online publication date: 26-Oct-2023
    • Show More Cited By

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOUPS '06: Proceedings of the second symposium on Usable privacy and security
    July 2006
    168 pages
    ISBN:1595934480
    DOI:10.1145/1143120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 July 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 15 of 49 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)35
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Design and FPGA Implementation of a Password Management System Utilizing RO PUF2024 5th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)10.1109/AINIT61980.2024.10581776(303-307)Online publication date: 29-Mar-2024
    • (2023)Password Manager with Multi-Factor Authentication2023 International Conference on Networking and Communications (ICNWC)10.1109/ICNWC57852.2023.10127424(1-5)Online publication date: 5-Apr-2023
    • (2023)Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions2023 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)10.1109/ESEM56168.2023.10304861(1-12)Online publication date: 26-Oct-2023
    • (2022)PassImg: A Secure Password Generation and Management Scheme without Storing2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD54268.2022.9776045(341-346)Online publication date: 4-May-2022
    • (2021)An Emerging Solution for Detection of Phishing AttacksCybersecurity Threats with New Perspectives [Working Title]10.5772/intechopen.96134Online publication date: 3-Mar-2021
    • (2021)SoKProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563590(339-357)Online publication date: 9-Aug-2021
    • (2021)A hidden-password online password managerProceedings of the 36th Annual ACM Symposium on Applied Computing10.1145/3412841.3442131(1683-1686)Online publication date: 22-Mar-2021
    • (2019)Building and Studying a Password Store that Perfectly Hides Passwords from ItselfIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.290255116:5(770-782)Online publication date: 1-Sep-2019
    • (2019)Implementation of Password Management System Using Ternary Addressable PUF Generator2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)10.1109/SAHCN.2019.8824792(1-8)Online publication date: Jun-2019
    • (2019)Usability, security and trust in password managers: A quest for user-centric properties and featuresComputer Science Review10.1016/j.cosrev.2019.03.00233(69-90)Online publication date: Aug-2019
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media