Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2699026.2699127acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

One Thing Leads to Another: Credential Based Privilege Escalation

Published: 02 March 2015 Publication History

Abstract

A user's primary email account, in addition to being an easy point of contact in our online world, is increasingly being used as a single point of failure for all web security. Features like unlimited message storage, numerous weak password reset features and economically enticing spoils (in the form of financial accounts or personal photos) all add up to an environment where overthrowing someone's life via their primary email account is increasingly likely and damaging. We describe an attack we call credential based privilege escalation, and a methodology to evaluate this attack's potential for user harm at web scale. In a study of over 9,000 users we find that, unsurprisingly, access to a vast number of online accounts can be gained by breaking into a user's primary email account (even without knowing the email account's password), but even then the monetizable value in a typical account is relatively low. We also describe future directions in understanding both the technical and human aspects of credential based privilege escalation.

References

[1]
Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., and Savage, S. Measuring the cost of cybercrime. In WEIS (2012).
[2]
Danchev, D. Hacked origin, uplay, hulu plus, netix, spotify, skype, twitter, instagram, tumblr, freelancer accounts offered for sale. http://www.webroot.com/blog/2013/06/07/hacked-origin-uplay-hulu-plus-netflix-spotify-skype-twitter-instagram-tumblr-freelancer-accounts-offered-for-sale/, 2013.
[3]
Federal Bureau of Investigation. International cooperation disrupts multi-country cyber theft ring. http://www.fbi.gov/news/pressrel/press-releases/international-cooperation-disrupts-multi-country-cyber-theft-ring, October 2010.
[4]
Florencio, D., and Herley, C. Is everything we know about password stealing wrong? Security & Privacy, IEEE 10, 6 (2012), 63--69.
[5]
Franklin, J., Perrig, A., Paxson, V., and Savage, S. An inquiry into the nature and causes of the wealth of internet miscreants. In ACM conference on Computer and communications security (2007), pp. 375--388.
[6]
Holz, T., Engelberth, M., and Freiling, F. Learning more about the underground economy: A case-study of keyloggers and dropzones. Springer, 2009.
[7]
Honan, M. How apple and amazon security aws led to my epic hacking. http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/, Aug 2012.
[8]
Krebs, B. The scrap value of a hacked pc. http://voices.washingtonpost.com/securityfix/ 2009/05/the_scrap_value_of_a_hacked_pc.html, May 2009.
[9]
Moore, T., and Clayton, R. Examining the impact of website take-down on phishing. In Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit (2007), ACM, pp. 1--13.
[10]
van Kloeten, O., and Tabachnik, I. Plain text offenders. http://plaintextoffenders.com/, 2012

Cited By

View all
  • (2023)A framework for analyzing authentication risks in account networksComputers and Security10.1016/j.cose.2023.103515135:COnline publication date: 1-Dec-2023
  • (2021)Simulation for cybersecurity: state of the art and future directionsJournal of Cybersecurity10.1093/cybsec/tyab0057:1Online publication date: 14-Mar-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
March 2015
362 pages
ISBN:9781450331913
DOI:10.1145/2699026
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 March 2015

Check for updates

Author Tags

  1. web privacy
  2. web security

Qualifiers

  • Poster

Funding Sources

  • National Science Foundation

Conference

CODASPY'15
Sponsor:

Acceptance Rates

CODASPY '15 Paper Acceptance Rate 19 of 91 submissions, 21%;
Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A framework for analyzing authentication risks in account networksComputers and Security10.1016/j.cose.2023.103515135:COnline publication date: 1-Dec-2023
  • (2021)Simulation for cybersecurity: state of the art and future directionsJournal of Cybersecurity10.1093/cybsec/tyab0057:1Online publication date: 14-Mar-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media