Top Banner
1 Client-side defenses against web-based identity theft Students: Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty: Dan Boneh and John Mitchell Stanford University PORTIA Project
32

1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

1

Client-side defenses against web-based identity theft

Students:Robert Ledesma, Blake Ross, Yuka

Teraguchi

Faculty: Dan Boneh and John Mitchell

Stanford University

PORTIA Project

Page 2: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

2

Phishing Attack

password?

Spam email: “There is a problem with your eBay account.”

User clicks on email link to go to badguy.com.

User thinks it is ebay.com, and enters eBay username and password.

Information is sent to the bad guy.

Page 3: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

3

Sample phishing email

Page 4: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

4

How does this lead to spoof page?

Link displayed• https://www.start.earthlink.net/track?billing.asp

Actual link in html email • source:https://start.earthlink.net/track?id=101fe8439 8a866372f999c983d8973e77438a993847183bca43d7 ad47e99219a907871c773400b8328898787762c&url= http://202.69.39.30/snkee/billing.htm?

session_id=8495...

Website resolved to• http://202.69.39.30/snkee/billing.htm?

session_id=8495...

Page 5: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

5

Spoof pagehttp://202.69.39.30/snkee/....

Page 6: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

6

Magnitude of problem

Fastest growing crime on the Internet.

Primary targets: attacks/month (2004)

http://www.antiphishing.org

July June May … Jan

Citibank 682 492 370 … 34

US Bank 622 251 167 … 2

eBay 255 285 293 … 51

Page 7: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

7

Properties of Spoof Sites

Ask for user input, e.g. password.• Some ask for CCN, SSN, mother’s maiden name, …

HTML copied from honest site• Contain links to the honest site

• Logos from honest site. Copied jpg/gif file, or link to honest site

• Can contain revealing mistakes

Clever spoof pages contain Javascript to fool user.

Short lived• Blacklisting spoof sites has limited success.

HTTPS uncommon

Page 8: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

8

Thanks!

Robert Rodriguez Chris Von HoltAlissa Cooper Tom Pageler Greg Crabb

Many more …

Page 9: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

9

What can we do about phishing?

Spam filter:•Phishing starts with email, so stop it there.•Non-trivial: phishing emails look like ordinary

email.

Browser-side methods (plug-ins)•Detect spoof web site. Warn user.• Improve browser password management.

Server-side methods:•Use strong user authentication instead of pwds.

– Certificates or security tokens.

This talk:

SpoofGuard

Page 10: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

10

Our project at Stanford

Two browser plug-ins available for download:

• SpoofGuard: – Alerts user when browser is viewing a spoofed web

page.– Uses variety of heuristics to identify spoof pages.

• PwdHash: – Simple mechanism for improving password

management by the browser.

Will SpoofGuard solve the phishing problem?•As likely to end phishing as first virus scanner

was to end viruses•A new type of anomaly detection problem

Page 11: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

11

SpoofGuard:Detect Phishing Web Sites

http://crypto.stanford.edu/SpoofGuard

Page 12: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

12

SpoofGuard Browser Plug-in

Compute spoof index: •Weighted sum of several spoof measures•Depends on current page and history

Provides two forms of information:•Passive stoplight in toolbar: green, yellow, red•Active pop-up when necessary

– Stop outgoing information to malicious web site

Challenges: •Must be easy for novice users.•Detect malicious pages•Minimize false alarms

Page 13: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

13

Stateless Page Evaluation

URL Check:•Similar to well known site

– www.ebay-fixit.com– www.ebau.com

• IP address instead of host name– http://123.123.123.123/

•Other tricks– [email protected]

•Use reverse DNS to find domain if IP address

Image Check:• Is image associated with different domain in

image-domain database

Page 14: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

14

Stateless Page Evaluation II

Link Check:•Run URL check on links on the page• If significant fraction fail, raise alert

Password Check:•Pages with password field are more suspicious

than the one without•Check for HTTPS and valid certificate

Page 15: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

15

Stateful Page Evaluation

History Check:•Site is assumed OK if in user’s history file•Very important for reducing false alarm rate

Domain Check:• Is current domain “similar” to a domain in the

history list?

Email Check:•Suspicious if page is referred by email link

Page 16: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

16

POST Data Evaluation

Intercepts and checks POST data•Keep hashed <domain, user, password>

triples

• If known user & password are sent to different domain, raise alert level

•Exception for search engines

•High alert: warn user and allow to cancel operationPOST:

user_name=ice&password=cream

Suspicious server

User

Page 17: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

17

SpoofGuard User Interface

SpoofGuard is added to IE tool bar•Traffic light

– Report green, yellow, red altert level

•Pop-up as method of last resort

Page 18: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

18

Evaluation of SpoofGuard

Detect sample spoofs•Tested on 12 spoofs from SF ECTF

Acceptable false alarm rate•Used ourselves for several weeks•Can get false alarms on first visit to site

– SpoofGuard learns which sites you trust– Does not popup on subsequent visits

Negligible performance impact

But: Clever phisher can defeat most tests

Page 19: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

19

PwdHash: Improved Pwd Mgmt

http://crypto.stanford.edu/PwdHash

Page 20: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

20

The common pwd problem

Web users use the same username/password at many sites.

•Users use their banking pwd at low security sites.

The problem: break-in to low security site reveals banking username/passwords.

Ideal solution: strong auth. protocols (SecureID/PKI)

•Unlike pwd, requires HW or has limited mobility.

Page 21: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

21

A Simple Solution

Browser plug-in that converts a user’s pwd into a unique pwd per site.

1. Locate all pwd HTML elements on page:<INPUT TYPE=password NAME=pass>

2. Whenever focus leaves a password field, replace contents of field with

HMACpwd(domain-name)

3. Password hash is sent to web site instead of pwd.

(some) Protection against phishing:• Spoof site only sees hash of user’s pwd.

Page 22: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

22

Pwd Hashing – an old idea

Hash pwd with realm provided by remote site:

•HTTP 1.1 Digest Authentication

•Kerberos 5

Hash pwd with network service name:

•Gabber, Gibbons, Matyas, Mayer [FC ’96]. Proxy.

•Abadi, Bharat, Marais [PTO ’97]

Challenge: implementing in a modern browser.

Page 23: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

23

Plug-in Challenges

Pwd reset after plug-in install

Javascript attacks

What salt to use in hash?

How to encode resulting hash?

When to compute hash?

Internet Café

Dictionary attacks

Design goal: transparent to user.

Page 24: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

24

Problem 1: pwd reset

After install, requires users to reset their pwds.

On pwd reset page, plug-in must not hash old pwd.• Plug-in identifies pwd reset page as having

three pwd fields.

• Plug-in does not hash first pwd field. (turns blue)

• Plug-in remembers to hash all pwd fields on future invocations of this reset page

To disable/toggle hashing: double-click in pwd field.

Problem: phishers could create a spoof pwd reset page and obtain pwds in the clear.• Plug-in warns user when it sends pwd un-hashed.

Page 25: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

25

Problem 2: Cafe’s

Users cannot install plug-in at Internet Cafe’s.

We provide a web site for remote hashing:http://crypto.stanford.edu/PwdHash/

Hash computed in Javascript.• Resulting hash copied into clipboard.

Page 26: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

26

Problem 3: Javascript attacks

Malicious site can create Javascript to steal user’s unhashed password.

• Record all key-strokes sent to page

• Change target-domain-name on submit

• Mask regular text field as a password field

– Even worse: as each keystroke is typed into field, send to evil site. (?)

Page 27: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

27

Javascript attacks (cont.)

Defense 1: Keyboard intercept.•System traps all keyboard events to window.• If keystroke intended for pwd field, replace with

‘%’– Browser never sees pwd.

•On ‘BeforeNavigate2’ event, replace ‘%%%’ in POST data with hashed pwd.

Defense 2: key-stream monitor.•System records all passwords user types (hashed).•System traps all keyboard events to window.• If key-stream ever contains a pwd not in pwd field,

alert user.

Page 28: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

28

Problem 4: what salt to use?

For few sites,

domain of pwd reset page domain of pwd

use page

passport reset page = services.passport.net

passport use page = login.passport.net

Incorrect pwd-hash is registered at site.

Config file tells plug-in what salt to use and how to encode hash:

<pwdhash domain=“*.com” tail=2 encode=1>

<pwdhash domain=“*.co.uk” tail=3 encode=1>

Page 29: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

29

Problem 5: Dictionary attacks

Main point: low security site never sees user’s pwd.

Dictionary attacks:•After phishing or break-in to low security site,

attacker obtains pwd hashes.

•Attacker can attempt dictionary attack on hashes.– Succeeds on 15% of pwds (unlike 100% today)

– Fundamental limitation of pwd authentication. Unavoidable when user’s key is low-entropy.

Defense: plug-in enables user to specify a global plug-in pwd used to strengthen all pwd hashes.

– Defense against dict. attacks for savvy users.

Page 30: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

30

Alternative designs

Better security against Javascript attacks:• Modify pwd UI: 1. User hits ctrl-P in password field.

2. Plug-in displays password dialog box.3. User enters password into dialog box.

• Plug-in embeds hashed-pwd directly into out-going POST data. (BeforeNavigate2 event)

• Javascript on page can’t see pwd and cannot spoof dialog box.

• Downside: confusing to users.

Better salt for pwd: Get salt from SSL certificate.

• Not possible with current plug-in support in IE.

• Microsoft could do this …

Page 31: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

31

Try it out!

Plug-ins continue to evolve and improve:

•Easier deployment and use.

•Proxy-based solutions (not browser plug-ins)

•Strengthen spoof page identification.

•Deployment through Mozilla and billeo.

http://crypto.stanford.edu/SpoofGuard

Page 32: 1 Client-side defenses against web-based identity theft Students:Robert Ledesma, Blake Ross, Yuka Teraguchi Faculty:Dan Boneh and John Mitchell Stanford.

32

crypto.stanford.edu/SpoofGuard