Top Banner

of 23

12966857-Phishing

Apr 06, 2018

Download

Documents

Shiv Csk
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/3/2019 12966857-Phishing

    1/23

    ABSTRACT

    The outcomes of phishing attacks are dramatically increasing every day. Attacks

    on financial services companies have been doubling each year compared to

    previous years. It is very important for companies to come up with new ways to

    solve phishing problems because it can become a major loss to well known

    companies. Also, it can cause consumers to lose confidence in doing business

    online, which can affect many companies with an online presence. Not any type

    of technology can stop phishing attacks, but there are many ways to enable

    phishers from accomplishing their goals. Consumer education can increase the

    awareness of the phishing threat and other online vulnerabilities. Lastly,

    biometrics should become one of the major aspects and play an important role to

    combat phishing because it provides different steps to authenticate users.

    INTRODUCTION

    Phishing is the practice where criminals send out unsolicited Commercial e-mails,

    masquerading as valid authorities by using Logos and other formatting to

  • 8/3/2019 12966857-Phishing

    2/23

    resemble authentic e-mails sent by the company that they are attempting to

    impersonate.

    Once the users receive such emails; the phishers attempt to lure them to web

    sites where personal information such as credit card number and social security

    numbers are required in an attempt to hack into the users accounts. The so-

    called phishers try to steal usernames and passwords for identity and banking

    theft.

    Companies such as PayPal, eBay, Amazon, and most of the banks have been the

    biggest target for phishing attacks.

    LITERATURE REVIEW

    The first phishing attempt occurred in January 1996. A hacker who was

    attempting to steal accounts from unexpected AOL Members coined the term

    phishing.

    Comparison to Spam

    The purpose of a phishing message is to acquire sensitive information about a

    user. In order to do so, the message needs to deceive the intended recipient into

    believing it is from a legitimate organization. As a form of deception, a phishing

    message contains no useful information for the intended recipient and thus falls

  • 8/3/2019 12966857-Phishing

    3/23

    under the category of spam. Although phishing is categorized as spam, it also

    differs from spam. Amongst other things, spam tries to sell a product or service,

    while a phishing message needs to look like it is from a legitimate organization.

    Due to the similarity between phishing and legitimate messages, techniques that

    are applied to spam messages cannot be applied naively to phishing messages.

    For example, text-based classification can perform reasonably well in identifying

    spam, but as a phishing message is forged to look like a message from a legitimate

    organization, text-based classification applied naively to a phishing message will

    have a high miss rate.

  • 8/3/2019 12966857-Phishing

    4/23

    Anatomy of a phishing message

    A raw phishing message can be split into two components: the content and the

    headers. These components are commonly accepted as being the major

    components of a message.

    Content:

    The content is the part of the message thatthe user sees and is used by phishing

    message producers todeceive users. It can be subdivided into two parts.

  • 8/3/2019 12966857-Phishing

    5/23

    y The cover is the content which is made to look like a message from the

    legitimate organization, and usually informs the user of a problem with

    their account. Early phishing messages could be identified based only on

    their cover, due to imperfect grammar or spelling mistakes (which are

    uncommon in legitimate messages). Over time, the covers used in phishing

    messages have become more sophisticated, to the point where they even

    warn the users about protecting their password and avoiding fraud. An

    example of this can be seen in Figure below where the phishing message

    tells the victim to Protect Your Account Info by making sure you never

    provide your password to fraudulent websites.

  • 8/3/2019 12966857-Phishing

    6/23

    y Thestingis the part of the content that directs the victim to take remedial

    actions. It usually takes the form of a clickable URL that directs the victim to

    a fake website to log into their account or enter other personal details. We

    call this the sting, as this is the part of the content that inflicts pain, by

    means of financial loss or other undesirable action after the victim enters

    their details on the website. Typically the sting is hidden by using HTML to

    display a legitimate looking address, instead of the address of the fake

    website. An example of this is shown in above Figure where the address of

  • 8/3/2019 12966857-Phishing

    7/23

    the fake website is http://www.nutristore.com.au/r.htm and the

    corresponding displayed text is a legitimate looking

    https://www2.paypal.com/cgi-bin/?cmd= login.

    Headers

    The headers are the part of the message which is primarily used by the mail

    servers and the mail client todetermine where the message is going and how to

    unpack the message. Most users do not see these headers, but in terms of

    determining if a message is phishing or not, this part of the message can be quite

    useful. Headers can be subdivided into three parts based on the entities which

    add them to the message:

    y Mail clients typically add headers such as To:, From:, Subject: and

    some client specific headers. Examples of mail client headers are X-

    MSMail-Priority, X-Mailer, and X-MimeOLE, and they can be seen in above

    figure. Phishing messages may try to fake a particular header and in doing

    so, give away that the message is fake. For example, if the X-Mailer header

    indicates that a HTML message has been composed using MS Outlook but

    the message only contains HTML (without plaintext), this is an indication

    that the message is fake, as MS Outlook cannot send HTML only messages.

    y Mail relays will add headers along the path of the message. These are

    usually Received headers, which can be used to determine the

    originating IP of the message and the path taken by the message.

  • 8/3/2019 12966857-Phishing

    8/23

    y Spam-filters or virus-scanners will usually add headers to the message to

    indicate results of the tests run over the message. These headers can then

    be used by the receiving client to determine (based on a user-set

    threshold) what to do with the message.

    WHY PHISHING ATTACK!

    Lack of Knowledge

    y Lack of computer system knowledge: Many users lack the underlying

    knowledge of how operating systems, applications, email and the web

    work and how to distinguish among these. Phishing sites exploit this lack of

    knowledge in several ways. For example, some users do not understand

    the meaning or the syntax of domain names and cannot distinguish

    legitimate versus fraudulent URLs (e.g., they may think www.ebay-

    members-security.com belongs to www.ebay.com). Another attack

    strategy forges the email header; many users do not have the skills to

    distinguish forged from legitimate headers.

    y Lack of knowledge of security and security indicators: Many users do not

    understand security indicators. For example, many users do not know that

    a closed padlock icon in the browser indicates that the page they are

  • 8/3/2019 12966857-Phishing

    9/23

    viewing was delivered securely by SSL. Even if they understand the

    meaning of that icon, users can be fooled by its placement within the body

    of a web page (this confusion is not aided by the fact that competing

    browsers use different icons and place them in different parts of their

    display). More generally, users may not be aware that padlock icons appear

    in the browser chrome (the interface constructed by the browser around

    a web page, e.g., toolbars, windows, address bar, status bar) only under

    specific conditions (i.e., when SSL is used), while icons in the content of the

    web page can be placed there arbitrarily by designers (or by phishers) to

    induce trust. Attackers can also exploit users lack of understanding of the

    verification process for SSL certificates. Most users do not know how to

    check SSL certificates in the browser or understand the information

    presented in a certificate. In one spoofing strategy, a rogue site displays a

    certificate authority's (CA) trust seal that links to a CA webpage. This

    webpage provides an English language description and verification of the

    legitimate sites certificate. Only the most informed and diligent users

    would know to check that the URL of the originating site and the legitimate

    site described by the CA match.

    y Lack of knowledge of web fraud: Some users dont know that spoofing

    websites is possible. Without awareness phishing is possible, some users

    simply do not question website legitimacy.

    y Erroneous security knowledge. Some users have misconceptions about

    which website features indicate security. For example, participants

    assumed that if websites contained professional-looking images,

    animations, and ads, they assumed the sites were legitimate (influenced by

  • 8/3/2019 12966857-Phishing

    10/23

    well-known trust indicators, discussed below). Similarly, dedicated login

    pages from banks were less trusted than those originating from a

    homepage; several participants mentioned a lack of images and links as a

    reason for their distrust.

    Visual Deception

    Phishers use visual deception tricks to mimic legitimate text, images and

    windows.

    y Visually deceptive text. Users may be fooled by the syntax of a domain

    name in type jacking attacks, which substitute letters that may go

    unnoticed (e.g. www.paypai.com uses a lowercase i which looks similar

    to the letter l, and www.paypa1.com substitutes the number 1 for the

    letter l). Phishers have also taken advantage of non-printing characters

    and non-ASCII Unicode characters in domain names.

    y Images masking underlying text. One common technique used by phishers

    is to use an image of a legitimate hyperlink. The image itself serves as a

    hyperlink to a different, rogue site.

    y Images mimicking windows. Phishers use images in the content of a web

    page that mimic browser windows or For user convenience, some

    legitimate organizations allow users to login from non-SSL pages. Although

    the user data may be transmitted securely, there is no visual cue in the

    browser to indicate if SSL is used for form submissions. To remedy this,

    designers resort to placing a padlock icon in the page content, a tactic that

    phishers also exploit or dialog windows. Because the image looks exactly

    like a real window, a user can be fooled unless he tries to move or resize

    the image.

  • 8/3/2019 12966857-Phishing

    11/23

    y Windows masking underlying windows: A common phishing technique is

    to place an illegitimate browser window on top of, or next to, a legitimate

    window. If they have the same look and feel, users may mistakenly believe

    that both windows are from the same source, regardless of variations in

    address or security indicators. In the worst case, a user may not even

    notice that a second window exists (browsers that allow borderless pop-up

    windows aggravate the problem).

    y Deceptive look and feel. If images and logos are copied perfectly,

    sometimes the only cues that are available to the user are the tone of the

    language, misspellings or other signs of unprofessional design. If the

    phishing site closely mimics the target site, the only cue to the user might

    be the type and quantity of requested personal information.

    .WHAT SHOULD BE DONE TO FIGHT

    PHISHING?(ANTI-

    PHISHING)

    Phishing needs to be followed in a managerial way within the network and its

    components such as servers, PCs, operating systems, browsers and other

    applications that run off a connection.

    As considering, the danger of both false negative where firewall packet

    inspection fails to identify a phishing site and false positive where firewall packet

    inspection wrongly rejects the valid sites, it is important to minimize these risks.

  • 8/3/2019 12966857-Phishing

    12/23

    Microsofts Anti-phishing response team analyzes sites carefully to confirm they

    are fraud e-mails before adding them to the blacklist. Even then, sites that are

    concerned can be reconsidered and later removed from the list.

    Another way of solving this problem can be in a technical way by using a

    biometric check up. Biometrics refers to technologies that analyze an individuals

    physical and behavioral characteristics to automate identification or verification

    of the user.

    To avoid the risk of being locked in by phishers here are few tips:

    Be extremely suspicious of any e-mails with urgent

    requests for personal information

    Do not fill out any forms in e-mail messages especially

    from banks

    Do not use the links that are provided in the e-mails this

    can cause installing any malicious malware on your

    computer. Instead contact the company over the phone

    to solve any problems.

    Do not give your credit card numbers or account

    information unless you are using a secure Web site or

    the telephone. If you are using a Web site, check the

    beginning of the web address in your browsers address

  • 8/3/2019 12966857-Phishing

    13/23

    bar. A secure site should up as https:// instead of just

    http://.

    y Verify the real address of a web site. Cut and paste the

    following text into your browser address bar.

    javascript:alert("The actual URL of this site has been verified

    as: " + location. protocol + "//" + location. hostname +"/");

    y Ensure that your browser and OS software is up-to-date and

    that latest security patches are applied.

    Possible ways ofby-passing AntiPhish with JavaScript

    As long as the web page that the user is viewing is pure HTML, AntiPhish can

    easily mitigate phishing attacks. This is because the attacker can only steal the

    sensitive information in the page after the user performs a submit. Before this can

    happen, however, AntiPhish detects that sensitive information has been typed

    into a form and cancels the operation. Stopping a phishing attack in an HTML

    page that has JavaScript, on the other hand, is not that easy and special care has

    to be taken. JavaScript is a powerful language that is widely used in webpage for

    providing functionality such as submitting forms, opening windows, intercepting

    events and performing input validity checks. At the same time, however,

    JavaScript gives the attacker a wide range of possibilities for by-passing a

    monitoring application such as AntiPhish. Just as AntiPhish creates hooks for

    intercepting user generated events such as key strokes, the attacker can also

  • 8/3/2019 12966857-Phishing

    14/23

    create such hooks using JavaScript embedded into the HTML page. Instead of

    waiting for the user to press a submit button to send the information, the

    attacker could intercept the keys that are pressed and send the information

    character by character to a server of her choice. Typically, this is done by

    modifying the URL of an existing or hidden image to a web site that the attacker

    controls (e.g., if a has been pressed, an image URL may be set to

    http://attacker.com/key?a). Another possibility for the attacker could be to set a

    simple timer and to capture snapshots of the information in the forms. In this

    way, an important part of the information could be captured without the user

    ever hitting a submit button. The easiest solution to the JavaScript problem is to

    deactivate JavaScript on a page that contains forms. Unfortunately, this solution is

    not feasible because, as mentioned before, a large number of Web sites use

    JavaScript for validation and submission purposes. The solution we use in

    AntiPhish is to deactivate JavaScript every time the focus is on an HTML text

    element and to reactivateit whenever the focus is lost. Using this technique, we

    ensure that the attacker is not able to create hooks, timers and intercept browser

    events such as key presses while the user is typing information into a text field. At

    the same time, we ensure that the legitimate JavaScript functionality on a page

    (e.g., such as input validation routines) are preserved. By the time the focus is lost

    from the text element and Java script is reactivated, AntiPhish has already

    determined if the information that was typed into the text element is sensitive. If

    the web site is un trusted, the operation can be canceled. One side-effect of our

    approach is that legitimate event-based Java script functionality such as input

    validation based on key presses will not function. The use of key press events for

  • 8/3/2019 12966857-Phishing

    15/23

    input validation, however, is uncommon. Most web sites perform client-side input

    validation once before a form is submitted.

    Implementation details

    We implemented the prototype of AntiPhish as a Mozilla browser extension (i.e.,plug-in).Mozilla browser extensions are written using the Mozilla XML User-

    Interface language (XUL) and JavaScript. The Mozilla implementation of AntiPhish

    has a small footprint and consists of about 900 lines of JavaScript code and 200

    lines of XUL user interface code. We used Paul Teros JavaScript DES

    implementation for safely storing the sensitive information.

    ANALYSIS OF A PHISHING DATABASE

    The Anti Phishing Working Group maintains a Phishing Archive describing

    phishing attacks dating back to September 2003. We performed a cognitive

    walkthrough on the approximately 200 sample attacks within this archive. (A

    cognitive walkthrough evaluates the steps required to perform a task and

    attempts to uncover mismatches between how users think about a task and how

    the user interface designer thinks about the task.) Our goal was to gather

    information about which strategies are used by attackers and to formulate

    hypotheses about how lay users would respond to these strategies. Below we list

    the strategies, organized along three dimensions: lack of knowledge, visual

    deception, and lack of attention. To aid readers who are unfamiliar with the topic,

    Security Terms and Definitions

    Certificate (digital certificate, public key certificate):

    Uses a digital signature to bind together a public key with an identity. If the browser

    encounters a certificate that has not been signed by a trusted certificate

    authority, it

    issues a warning to the user. Some organizations create and sign their own selfsigned

    Certificates. If a browserencounters a self-signed certificate, it issues a warning and

    allows the user to decide whether to accept the certificate.

    Certificate Authority (CA):

  • 8/3/2019 12966857-Phishing

    16/23

    An entity that issuescertificatesand attests that a public key belongs to a particular

    identity. A list of trusted CAs isstored in the browser. A certificate may be issued to a

    fraudulent website by a CA without a rigorous verification process.

    HTTPS:

    Web browsers use "HTTPS", rather than "HTTP" as a prefix to theURL to indicate that

    HTTP issent overSSL/TLS.

    Secure Sockets Layer (SSL) and Transport LayerSecurity

    (TLS):

    Cryptographic protocols used to provide authentication and secure communications

    over the Internet. SSL/TLS authenticates a server by verifying that theserver holds a

    certificate that has been digitallysigned by a trusted certificateauthority. SSL/TLS also

    allows the client and server to agree on an encryption algorithm for securing

    communications.

    CryptographyCryptography is a method of storing and transmitting data in a form that only

    those it is intended for can read and process. It is a science of protecting

    information by encoding it into an unreadable format. Cryptography is an

    effective way of protecting sensitive information as it is stored on media or

    transmitted through network communication paths.

    Although the ultimate goal of cryptography, and the mechanisms that make it up,

    is to hide information from unauthorized individuals, most algorithms can be

    broken and the information can be revealed if the attacker has enough time,

    desire, and resources. So a more realistic goal of cryptography is to make

    obtaining the information too work-intensive to be worth it to the attacker.

    Digital Certificates

    Digital Certificates are part of a technology called Public Key Infrastructure or

    PKI. Digital certificates have been described as virtual ID cards. This is a useful

    analogy. There are many ways that digital certificates and ID cards really are the

  • 8/3/2019 12966857-Phishing

    17/23

    same. Both ID cards and client digital certificates contain information about user,

    such as user name and information about the organization that issued the

    certificate or card to user.

    Creating digital certificates a unique cryptographic key pair is generated. One of

    these keys is referred to as a public key and the other as a private key. The

    certification authoritygenerally on your campuscreates a digital certificate by

    combining information about user and the issuing organization with the public

    key and digitally signing the whole thing. This is very much like an organizations

    ID office filling out an ID card for user and then signing it to make it official.

    The process defines how a certificate authority establishes that a person or

    institution is who they say they are. Certification may require recipients to appear

    in person and to present pictures, birth certificates, or social security numbers.Certificates that are issued after rigorous authentication will be more trustworthy

    than certificates requiring little or noiauthentication.

    The contents of a digital certificate are prescribed by the X.509 standard,

    developed by the International Standards Organization (ISO) and adopted by the

    American National Standards Institute (ANSI) and the Internet Engineering Task

    Force (IETF). The latest version is now X509 v3. The principal elements of a digital

    certificate are as follows:

    Version number of the certificate format Serial number of the certificate

    Signature algorithm identifier

    Issuer of digital certificate: a certificate authority with URL

    Validity period

    Unique identification of certificate holder

    Public key information

    The Parties to a Digital CertificateIn principle there are three different interests associated with a digital certificate:

    The Requesting PartyThe party who needs the certificate and will offer it for use by others they will

    generally provide some or all of the information it contains.

    The Issuing Party

    The party that digitally signs the certificate after creating the information in the

    certificate orchecking its correctness.

    The Verifying Party (or Parties)

  • 8/3/2019 12966857-Phishing

    18/23

    Parties that validate the signature on the certificate and then rely on its contents for

    some purpose.Type of Certificate Requesting Party Issuing Party Verifying PartyIdentity The person

    concernedThe appropriategovernment agency

    Anyone undertakingan

    identity checkAccreditation A qualified memberof a profession

    The professionalbody

    A user of theservicesoffered by themember

    Authorization A customer wishing toaccess a resource

    The resource owner The resource owner

    Public key CertificateThe combination of standards, protocols, and software that support digital

    certificates is called a public key infrastructure,or PKI. The software that supports

    this infrastructure generates sets of public-private key pairs. Public-private key

    pairs are codes that are related to one another through a complex mathematical

    algorithm. The key pairs can reside on ones computer or on hardware devices

    such as smart cards or floppy disks. Individuals or organizations must ensure the

    security of their private keys. However, the public keys that correspond to theirprivate keys can be posted on Web sites or sent across the network. Issuers of

    digital certificates often maintain online repositories of public keys. These

    repositories make it possible to authenticate owners of digital certificates in real

    time.

    For example, publishers, as service providers, will want to authenticate the digital

    certificate of a faculty member or student in real time. This is possible by verifying

    the digital signature using the public y in the repository.

  • 8/3/2019 12966857-Phishing

    19/23

    Certificate AuthoritiesDigital certificates are one part of a set of components that make up a public key

    infrastructure (PKI). A PKI includes organizations called certification authorities

    (CAs) that issue, manage, and revoke digital certificates; organizations called

    relyingparties who use the certificates as indicators of authentication, and clients

    who request, manage, and use certificates. A CA might create a separateregistration authority(RA) to handle the task of identifying individuals who apply

    for certificates. Examples of certification authorities include VeriSign, a wellknown

    commercial provider, and the CREN Certificate Authority that is

    available for higher education institutions.

    Types of Certificates

    There are different types ofcertificates, each with different functions and this can

    be confusing. It helps to differentiate between at least four types ofcertificates.

    You can see samples of some of these different types of certificates in your

    browser.

    Root or authority certificates

    These are certificates that create the base (or root) of a certification authority

    hierarchy, such as Thawte or CREN. These certificates are not signed by another

    CAthey are self signedby the CA that created them. When a certificate is self-

  • 8/3/2019 12966857-Phishing

    20/23

    signed, it means that the name in the Issuer field is the same as the name in the

    Subject Field.

    Institutional authority certificates

    These certificates are also called campus certificates. These certificates are signed

    by a third party verifying the authenticity of a campus certification authority.

    Campuses then use their authority to issue client certificates for faculty, staff,

    and students.

    Client certificates

    These are also known as end-entity certificates, identity certificates, or personal

    certificates. The Issuer is typically the campus CA.

    Web server certificates

    These certificates are used to secure communications to and from Web servers, for

    example when you buy something on the Web. They are called server-side

    certificates. The Subject name in a servercertificate is the DNS name of the server.

    The CREN Digital Certificate ServicesCREN currently offers an expanded set ofcertificate authority services to higher

    education institutions.

    CREN-signed campus certificates for institutions

    These CREN-signed certificates are for institutions issuing certificates for their

    campus communityin the range of 10 or more Web servercertificates and for

    more than 500-1000 client certificates.

    CREN Web server certificatesThese certificates are forcampuses to use for securing Web servers, supporting a

    range ofcampus Web applications.

    Client certificates

    CREN has an internal CREN.NET service equivalent to a campus certificate-

    issuing application. A registration contact at a campus validates/approves

    individuals and CREN issues the certificates.

    With these three levels of service including the free test certificates CREN

    can

    helpcampuses get started usi

    ng digital

    certifi

    cates at a level mat

    chi

    ng theirparticularcampus needs.

  • 8/3/2019 12966857-Phishing

    21/23

    RECOMMENDATION

    It is very important to reduce the risk of phishing in todays business because

    hackers need to stay out of companies databases. Todays education is not

    enough since phishes are getting better each day and coming with newer trends

    to catch innocent customers.

    The real problem of phishing is because the login systems are very weak and thusthey need to be tighter when it comes to users authentication. The companies

    could increase their cryptographic system protection by using more IPSec VPNs

    and digital certificates. The use of IPSec VPNs, customers will need to establish

    digital certificates from a certificate authority as well as the merchant. Recently,

    while doing this research we came through an article from PayPal where they are

    convincing email providers to block messages that lack digital signatures.

    The reason for this is that PayPal is known as one of the most highly spoofed

    brands that fraudsters uses today .This is a very good idea and a good way to

    keep hackers out of PayPal databases. As a matter of fact, not only PayPal but also

    every company that conducts business should come up with a similar strategy like

  • 8/3/2019 12966857-Phishing

    22/23

    this. Using strategies similar to this will help customers to gain confidence in

    doing business and dealing with money issues. In addition, well-known companies

    should increase user awareness by education, training and working with FBI to

    track down phishers.

    CONCLUSION

    In short, the outcomes of phishing attacks are dramatically increasing every day.

    Attacks on financial services companies have been doubling each year compared

    to previous years. It is of crucial importance for companies to come up with new

    ways to solve phishing problems because it can become a major loss to well-known companies.

    Also, it can cause consumers to lose confidence in doing business online, which

    can affect many companies with an online presence. Not any type of technology

    Can stop phishing attacks, but there are many ways to enable Phishes from

    accomplishing their goals.

    Consumer education can increase the awareness of the phishing threat and other

    online vulnerabilities. Lastly, biometrics should become one of the major aspects

    and play an important role to combat phishing because it provides different steps

    to authenticate users.

    REFERENCES

    [1] Cannon, J.C. Privacy. Pearson Education, 2005.

    [2] Hilley, Sarah. Internet war: picking on the finance

    Sector-survey. Computer Fraud & Security, October

    2006.

    [3] Bellowin, Steven. Spamming, Phishing,

    Authentication and Privacy. Inside Risks,December

  • 8/3/2019 12966857-Phishing

    23/23

    2004 Vol.47, No.12. 144.

    [4] Mulrean, Jennifer. Phishing scams: How to avoid

    Getting hooked. DollarWise.

    [5] Hunter, Philip. Microsoft declares war on phishers.

    Computer Fraud & SecurityMay 2006: (15-16).

    [6] Google. http://www.google.com

    [7] Anti-Phishing Working Group. Phishing Activity

    Trends Report November 2005

    [8] Anti-Phishing Working Group Phishing Archive.

    http://anti-phishing.org/phishing_archive.htm

    [9] Ba, S. & P. Pavlov. Evidence of the Effect of Trust

    Building Technology in Electronic Markets: Price

    Premiums and Buyer Behavior.

    i