an empirical study of visual security cues to prevent the sslstripping attack

25
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Source: ACSAC 2011 Authors: Dongwan Shin, Rodrigo Lopes Report: Minhao Wu Date: 2011-12-20

Upload: yagil

Post on 06-Jan-2016

19 views

Category:

Documents


1 download

DESCRIPTION

An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack. Source: ACSAC 2011 Authors: Dongwan Shin, Rodrigo Lopes Report: Minhao Wu Date: 2011-12-20. outline. Introduction Related work Our approach User study Discussion Conclusion. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack

Source: ACSAC 2011Authors: Dongwan Shin, Rodrigo LopesReport: Minhao WuDate: 2011-12-20

Page 2: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

outlineIntroductionRelated workOur approachUser studyDiscussionConclusion

Page 3: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

IntroductionSSLstripping attack introduced at the

Blackhat conference in 2009It attacks secure socket layer (SSL), which

is the most widely used security mechanism that enables secure communication establishment between two parties over the Internet.

As a type of man-in the-middle (MITM) attack, the attack could affect tens of millions of online users of popular SSL-protected web sites such as Facebook.com.

Page 4: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 5: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 6: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

Related workNikiforakis et al. proposed an approach

to leveraging a client side HTTP proxy, which, relying on browser history, would compare the current request with previous requests made to the same website

it fails to address several issues◦ it requires a browser history◦This automatically excludes all users that do

not save browsing historyit assumes that the attack is never a zero

day attack

Page 7: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 8: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

Our approach

Page 9: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 10: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 11: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

We developed an algorithm that will ◦look at the web page source code

and◦output an evaluation based on the

comparison of the web page’s address and

◦the login form’s action data, which has an URL where credentials will be submitted

Page 12: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

if the page loaded by the web browser is already being accessed over SSL.

if the certificate proves not to be invalid, we compare the domain in the form action with the domain of the loaded page

Page 13: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

User studyGeneral awareness of secure

form submissionEffectiveness of SSLstripping,

given the awarenessUnhelpfulness of an existing

methodHelpfulness of visual cue-based

methodsEffectiveness of different visual

cue methods

Page 14: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

Group 1: Exposed to the attack with no warning

Group 2: Exposed to the attack with the standard pop-up warning dialog

Group 3: Exposed to the attack with the SSLight warning in the login form fields

Group 4: Exposed to the attack with the blinking background in the login form fields

Page 15: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 16: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 17: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

User study results

Page 18: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 19: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 20: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 21: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

Discussion

Page 22: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 23: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 24: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack
Page 25: An Empirical Study of Visual Security Cues to Prevent the  SSLstripping  Attack

CONCLUSIONthe proposed solutions are more

effective and efficient in preventing the SSLstripping attack than the classic pop-up window method.

We see the emergence of long solved security flaws in new devices, as is the case of the recent browser user interface spoofing in iPhone.