SlideShare uma empresa Scribd logo
1 de 45
Baixar para ler offline
CMU Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
Operating system framed in
case of mistaken identity
Measuring the success of web-based spoofing
attacks on OS password-entry dialogs
Cristian Bravo-Lillo, Lorrie Cranor, Julie Downs, Saranga Komanduri, Manya
Sleeper (Carnegie Mellon University)
Stuart Schechter (Microsoft Research)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
22
Motivation
 Users have to make security decisions too often
 Decisions are usually based on:
• Information presented on-the-fly by different principals (OS,
browser, etc.)
• Beliefs, knowledge, hunches...
 Many decisions are triggered by security dialogs
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
33
Trusted path problem
 How do users know that information presented by the OS
really comes from the OS?
 Would users be able to spot fake dialogs asking for a
password?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
44
Possible consequences
 Install or run malicious software (e.g., fake AV software)
 Ignore security warnings
 Turn OS security features off
 Reveal secrets that should only be shared with OS
(passwords)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
55
Windows has two defenses
 Ctrl-Alt-Del before entering
password
• “Don't enter your password
without hitting Ctrl-Alt-Del”
 Trusted desktop:
• Dimming screen outside of UAC
dialog
• “Enter your password without
Ctrl-Alt-Del only if screen dims”
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
66
Research question
What proportion of users would enter their
passwords in a spoofed OS window?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
77
Experimental design
“Give us your opinion
about online games”
“Is the password
you entered real?”
“May we keep it
for research?”
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1010
1010
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1212
1212
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1414
1414
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1616
1616
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1717
1717
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1818
1818
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1919
1919
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2020
2020
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2121
2121
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2222
2222
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2323
2323
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2424
2424
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2525
2525
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2626
2626
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2727
2727
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2828
2828
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2929
2929
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3030
3030
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3131
3131
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3232
3232
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3535
3535
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3636
3636
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3838
3838
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3939
3939
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4040
4040
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4242
Conditions
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4343
Challenges in learning what really happened
 How can we know which participants entered real
passwords?
• If deceived, participants may be/feel (deeply) harmed
• Participants may not want to admit being deceived
• We cannot ethically/legally verify that we’ve tricked them
without their consent
 How can we know which participants detected spoofing?
• People don't like admitting that they were fooled
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4444
How do we determine if a participant knew that
the window was spoofed?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4646
Results
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4747
Participants' demographics
 504 US-only participants across 11 conditions:
• 28 years old (σ=9.6 years)
• 55% males, 78% caucasian
• Top two reported occupations: 33% students, 13% unemployed
• 17 min 23 sec to complete study (σ=18 min 15 sec)
 199 US-only participants in follow-up experiment:
• 29 years old (σ=9.7 years)
• 53% males, 77% caucasian
• Top two reported occupations: 28% students, 16% unemployed
• 19 min 57 sec to complete study (σ=8 min 26 sec)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4848
We categorize participants into three groups
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4949
Who was wise to the attack?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
27%
29%
34%
40%
29%
19%
29%
57%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5050
Who was oblivious?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
40%
37%
45%
45%
43%
42%
65%
39%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5151
Who was compromised?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
27%
35%
21%
15%
8% 6%
4%8%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5252
Follow-up for UAC, cancel-enabled
[15.0% – 26.2%]
[25.2% – 38.2%]
[40.8% – 54.6%]
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5353
Limitations of deception
 In both cases: dialog embedded in browser
 In Windows: no screen dim-out
 In Mac OS: no username filled-in, simplified installation
sequence
 Despite these differences, we still had participants who entered
their credentials:
• At least 15% in Windows 7/Vista across IE9, Chrome, and Firefox
• ~ 6% in Mac OS across Safari, Chrome and Firefox
• 5% fake AV attacks [Cova et al. 2010, 2012]
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5454
Conclusions and future work
 A large number of users are not able to discriminate whether
information comes from the OS or a malicious attacker
 Problem may be worsened by:
• Habituation to dialogs
• Lack of attention, not knowing what to look for/where to look
 Future work:
• Design and test new ways to drive users' attention to critical
information in the security dialog
• Determine how quickly habituation occurs, and ways to avoid it
CMU Usable Privacy and Security
Laboratory
http://cups.cs.cmu.edu/

Mais conteúdo relacionado

Semelhante a Operating system framed in case of mistaken identity

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Jason Hong
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.pptSaba651353
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Jason Hong
 
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Duane Rigsby
 
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth PresentationRemote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth PresentationSoftware Secure, Inc.
 
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth PresentationRemote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth PresentationSoftware Secure, Inc.
 
Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013Software Secure, Inc.
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Paul Haskell-Dowland
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfCCNAAccount
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams AcademyAdams Academy
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsOuzza Brahim
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrichdrewz lin
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams AcademyAdams Academy
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakaleAakash Takale
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 

Semelhante a Operating system framed in case of mistaken identity (20)

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
 
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
 
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth PresentationRemote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
 
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth PresentationRemote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
 
Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Operating system framed in case of mistaken identity

  • 1. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/ Operating system framed in case of mistaken identity Measuring the success of web-based spoofing attacks on OS password-entry dialogs Cristian Bravo-Lillo, Lorrie Cranor, Julie Downs, Saranga Komanduri, Manya Sleeper (Carnegie Mellon University) Stuart Schechter (Microsoft Research)
  • 2. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 22 Motivation  Users have to make security decisions too often  Decisions are usually based on: • Information presented on-the-fly by different principals (OS, browser, etc.) • Beliefs, knowledge, hunches...  Many decisions are triggered by security dialogs
  • 3. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 33 Trusted path problem  How do users know that information presented by the OS really comes from the OS?  Would users be able to spot fake dialogs asking for a password?
  • 4. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 44 Possible consequences  Install or run malicious software (e.g., fake AV software)  Ignore security warnings  Turn OS security features off  Reveal secrets that should only be shared with OS (passwords)
  • 5. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 55 Windows has two defenses  Ctrl-Alt-Del before entering password • “Don't enter your password without hitting Ctrl-Alt-Del”  Trusted desktop: • Dimming screen outside of UAC dialog • “Enter your password without Ctrl-Alt-Del only if screen dims”
  • 6. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 66 Research question What proportion of users would enter their passwords in a spoofed OS window?
  • 7. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 77 Experimental design “Give us your opinion about online games” “Is the password you entered real?” “May we keep it for research?”
  • 8. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1010 1010
  • 9. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1212 1212
  • 10. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1414 1414
  • 11. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1616 1616
  • 12. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1717 1717
  • 13. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1818 1818
  • 14. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1919 1919
  • 15. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2020 2020
  • 16. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2121 2121
  • 17. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2222 2222
  • 18. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2323 2323
  • 19. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2424 2424
  • 20. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2525 2525
  • 21. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2626 2626
  • 22. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2727 2727
  • 23. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2828 2828
  • 24. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2929 2929
  • 25. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3030 3030
  • 26. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3131 3131
  • 27. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3232 3232
  • 28. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3535 3535
  • 29. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3636 3636
  • 30. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3838 3838
  • 31. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3939 3939
  • 32. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4040 4040
  • 33. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4242 Conditions UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled
  • 34. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4343 Challenges in learning what really happened  How can we know which participants entered real passwords? • If deceived, participants may be/feel (deeply) harmed • Participants may not want to admit being deceived • We cannot ethically/legally verify that we’ve tricked them without their consent  How can we know which participants detected spoofing? • People don't like admitting that they were fooled
  • 35. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4444 How do we determine if a participant knew that the window was spoofed?
  • 36. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4646 Results
  • 37. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4747 Participants' demographics  504 US-only participants across 11 conditions: • 28 years old (σ=9.6 years) • 55% males, 78% caucasian • Top two reported occupations: 33% students, 13% unemployed • 17 min 23 sec to complete study (σ=18 min 15 sec)  199 US-only participants in follow-up experiment: • 29 years old (σ=9.7 years) • 53% males, 77% caucasian • Top two reported occupations: 28% students, 16% unemployed • 19 min 57 sec to complete study (σ=8 min 26 sec)
  • 38. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4848 We categorize participants into three groups
  • 39. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4949 Who was wise to the attack? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 27% 29% 34% 40% 29% 19% 29% 57%
  • 40. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5050 Who was oblivious? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 40% 37% 45% 45% 43% 42% 65% 39%
  • 41. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5151 Who was compromised? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 27% 35% 21% 15% 8% 6% 4%8%
  • 42. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5252 Follow-up for UAC, cancel-enabled [15.0% – 26.2%] [25.2% – 38.2%] [40.8% – 54.6%]
  • 43. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5353 Limitations of deception  In both cases: dialog embedded in browser  In Windows: no screen dim-out  In Mac OS: no username filled-in, simplified installation sequence  Despite these differences, we still had participants who entered their credentials: • At least 15% in Windows 7/Vista across IE9, Chrome, and Firefox • ~ 6% in Mac OS across Safari, Chrome and Firefox • 5% fake AV attacks [Cova et al. 2010, 2012]
  • 44. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5454 Conclusions and future work  A large number of users are not able to discriminate whether information comes from the OS or a malicious attacker  Problem may be worsened by: • Habituation to dialogs • Lack of attention, not knowing what to look for/where to look  Future work: • Design and test new ways to drive users' attention to critical information in the security dialog • Determine how quickly habituation occurs, and ways to avoid it
  • 45. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/