SlideShare a Scribd company logo
CMU Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
Operating system framed in
case of mistaken identity
Measuring the success of web-based spoofing
attacks on OS password-entry dialogs
Cristian Bravo-Lillo, Lorrie Cranor, Julie Downs, Saranga Komanduri, Manya
Sleeper (Carnegie Mellon University)
Stuart Schechter (Microsoft Research)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
22
Motivation
 Users have to make security decisions too often
 Decisions are usually based on:
• Information presented on-the-fly by different principals (OS,
browser, etc.)
• Beliefs, knowledge, hunches...
 Many decisions are triggered by security dialogs
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
33
Trusted path problem
 How do users know that information presented by the OS
really comes from the OS?
 Would users be able to spot fake dialogs asking for a
password?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
44
Possible consequences
 Install or run malicious software (e.g., fake AV software)
 Ignore security warnings
 Turn OS security features off
 Reveal secrets that should only be shared with OS
(passwords)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
55
Windows has two defenses
 Ctrl-Alt-Del before entering
password
• “Don't enter your password
without hitting Ctrl-Alt-Del”
 Trusted desktop:
• Dimming screen outside of UAC
dialog
• “Enter your password without
Ctrl-Alt-Del only if screen dims”
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
66
Research question
What proportion of users would enter their
passwords in a spoofed OS window?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
77
Experimental design
“Give us your opinion
about online games”
“Is the password
you entered real?”
“May we keep it
for research?”
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1010
1010
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1212
1212
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1414
1414
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1616
1616
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1717
1717
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1818
1818
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
1919
1919
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2020
2020
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2121
2121
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2222
2222
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2323
2323
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2424
2424
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2525
2525
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2626
2626
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2727
2727
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2828
2828
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
2929
2929
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3030
3030
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3131
3131
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3232
3232
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3535
3535
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3636
3636
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3838
3838
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
3939
3939
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4040
4040
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4242
Conditions
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4343
Challenges in learning what really happened
 How can we know which participants entered real
passwords?
• If deceived, participants may be/feel (deeply) harmed
• Participants may not want to admit being deceived
• We cannot ethically/legally verify that we’ve tricked them
without their consent
 How can we know which participants detected spoofing?
• People don't like admitting that they were fooled
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4444
How do we determine if a participant knew that
the window was spoofed?
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4646
Results
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4747
Participants' demographics
 504 US-only participants across 11 conditions:
• 28 years old (σ=9.6 years)
• 55% males, 78% caucasian
• Top two reported occupations: 33% students, 13% unemployed
• 17 min 23 sec to complete study (σ=18 min 15 sec)
 199 US-only participants in follow-up experiment:
• 29 years old (σ=9.7 years)
• 53% males, 77% caucasian
• Top two reported occupations: 28% students, 16% unemployed
• 19 min 57 sec to complete study (σ=8 min 26 sec)
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4848
We categorize participants into three groups
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
4949
Who was wise to the attack?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
27%
29%
34%
40%
29%
19%
29%
57%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5050
Who was oblivious?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
40%
37%
45%
45%
43%
42%
65%
39%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5151
Who was compromised?
UAC CredUI Mac OS w/
install Mac OS w/o install
Cancel
enabled
Cancel
disabled
27%
35%
21%
15%
8% 6%
4%8%
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5252
Follow-up for UAC, cancel-enabled
[15.0% – 26.2%]
[25.2% – 38.2%]
[40.8% – 54.6%]
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5353
Limitations of deception
 In both cases: dialog embedded in browser
 In Windows: no screen dim-out
 In Mac OS: no username filled-in, simplified installation
sequence
 Despite these differences, we still had participants who entered
their credentials:
• At least 15% in Windows 7/Vista across IE9, Chrome, and Firefox
• ~ 6% in Mac OS across Safari, Chrome and Firefox
• 5% fake AV attacks [Cova et al. 2010, 2012]
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
5454
Conclusions and future work
 A large number of users are not able to discriminate whether
information comes from the OS or a malicious attacker
 Problem may be worsened by:
• Habituation to dialogs
• Lack of attention, not knowing what to look for/where to look
 Future work:
• Design and test new ways to drive users' attention to critical
information in the security dialog
• Determine how quickly habituation occurs, and ways to avoid it
CMU Usable Privacy and Security
Laboratory
http://cups.cs.cmu.edu/

More Related Content

Similar to Operating system framed in case of mistaken identity

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Jason Hong
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
Saba651353
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Jason Hong
 
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Duane Rigsby
 
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth PresentationRemote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Software Secure, Inc.
 
Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013
Software Secure, Inc.
 
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth PresentationRemote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Software Secure, Inc.
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019
Paul Haskell-Dowland
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Jason Hong
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
CCNAAccount
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
Adams Academy
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
Ouzza Brahim
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
drewz lin
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
Adams Academy
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
Kushantha Gunawardana
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
Aakash Takale
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
 

Similar to Operating system framed in case of mistaken identity (20)

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
 
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Automated malware analysis - Nguyễn Chấn Việt
 
Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...Implementing whole disk encryption State Wide, the good, the bad and the encr...
Implementing whole disk encryption State Wide, the good, the bad and the encr...
 
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth PresentationRemote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
Remote Proctor: Software Secure MSCHE 2013 Annual Conference Booth Presentation
 
Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013Remote Proctor: Software Secure SACSCOC Conference 2013
Remote Proctor: Software Secure SACSCOC Conference 2013
 
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth PresentationRemote Proctor: Software Secure Sloan-C 2013 Booth Presentation
Remote Proctor: Software Secure Sloan-C 2013 Booth Presentation
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019Ethical hacking 101 - Singapore RSA 2019
Ethical hacking 101 - Singapore RSA 2019
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
 
An Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse MovementsAn Efficient User VErification System via Mouse Movements
An Efficient User VErification System via Mouse Movements
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Cyber security diploma level 3 - Adams Academy
Cyber security diploma level 3  - Adams AcademyCyber security diploma level 3  - Adams Academy
Cyber security diploma level 3 - Adams Academy
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
3DPassword_AakashTakale
3DPassword_AakashTakale3DPassword_AakashTakale
3DPassword_AakashTakale
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Operating system framed in case of mistaken identity

  • 1. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/ Operating system framed in case of mistaken identity Measuring the success of web-based spoofing attacks on OS password-entry dialogs Cristian Bravo-Lillo, Lorrie Cranor, Julie Downs, Saranga Komanduri, Manya Sleeper (Carnegie Mellon University) Stuart Schechter (Microsoft Research)
  • 2. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 22 Motivation  Users have to make security decisions too often  Decisions are usually based on: • Information presented on-the-fly by different principals (OS, browser, etc.) • Beliefs, knowledge, hunches...  Many decisions are triggered by security dialogs
  • 3. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 33 Trusted path problem  How do users know that information presented by the OS really comes from the OS?  Would users be able to spot fake dialogs asking for a password?
  • 4. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 44 Possible consequences  Install or run malicious software (e.g., fake AV software)  Ignore security warnings  Turn OS security features off  Reveal secrets that should only be shared with OS (passwords)
  • 5. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 55 Windows has two defenses  Ctrl-Alt-Del before entering password • “Don't enter your password without hitting Ctrl-Alt-Del”  Trusted desktop: • Dimming screen outside of UAC dialog • “Enter your password without Ctrl-Alt-Del only if screen dims”
  • 6. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 66 Research question What proportion of users would enter their passwords in a spoofed OS window?
  • 7. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 77 Experimental design “Give us your opinion about online games” “Is the password you entered real?” “May we keep it for research?”
  • 8. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1010 1010
  • 9. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1212 1212
  • 10. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1414 1414
  • 11. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1616 1616
  • 12. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1717 1717
  • 13. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1818 1818
  • 14. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 1919 1919
  • 15. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2020 2020
  • 16. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2121 2121
  • 17. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2222 2222
  • 18. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2323 2323
  • 19. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2424 2424
  • 20. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2525 2525
  • 21. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2626 2626
  • 22. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2727 2727
  • 23. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2828 2828
  • 24. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 2929 2929
  • 25. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3030 3030
  • 26. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3131 3131
  • 27. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3232 3232
  • 28. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3535 3535
  • 29. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3636 3636
  • 30. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3838 3838
  • 31. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 3939 3939
  • 32. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4040 4040
  • 33. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4242 Conditions UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled
  • 34. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4343 Challenges in learning what really happened  How can we know which participants entered real passwords? • If deceived, participants may be/feel (deeply) harmed • Participants may not want to admit being deceived • We cannot ethically/legally verify that we’ve tricked them without their consent  How can we know which participants detected spoofing? • People don't like admitting that they were fooled
  • 35. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4444 How do we determine if a participant knew that the window was spoofed?
  • 36. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4646 Results
  • 37. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4747 Participants' demographics  504 US-only participants across 11 conditions: • 28 years old (σ=9.6 years) • 55% males, 78% caucasian • Top two reported occupations: 33% students, 13% unemployed • 17 min 23 sec to complete study (σ=18 min 15 sec)  199 US-only participants in follow-up experiment: • 29 years old (σ=9.7 years) • 53% males, 77% caucasian • Top two reported occupations: 28% students, 16% unemployed • 19 min 57 sec to complete study (σ=8 min 26 sec)
  • 38. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4848 We categorize participants into three groups
  • 39. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 4949 Who was wise to the attack? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 27% 29% 34% 40% 29% 19% 29% 57%
  • 40. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5050 Who was oblivious? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 40% 37% 45% 45% 43% 42% 65% 39%
  • 41. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5151 Who was compromised? UAC CredUI Mac OS w/ install Mac OS w/o install Cancel enabled Cancel disabled 27% 35% 21% 15% 8% 6% 4%8%
  • 42. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5252 Follow-up for UAC, cancel-enabled [15.0% – 26.2%] [25.2% – 38.2%] [40.8% – 54.6%]
  • 43. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5353 Limitations of deception  In both cases: dialog embedded in browser  In Windows: no screen dim-out  In Mac OS: no username filled-in, simplified installation sequence  Despite these differences, we still had participants who entered their credentials: • At least 15% in Windows 7/Vista across IE9, Chrome, and Firefox • ~ 6% in Mac OS across Safari, Chrome and Firefox • 5% fake AV attacks [Cova et al. 2010, 2012]
  • 44. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ 5454 Conclusions and future work  A large number of users are not able to discriminate whether information comes from the OS or a malicious attacker  Problem may be worsened by: • Habituation to dialogs • Lack of attention, not knowing what to look for/where to look  Future work: • Design and test new ways to drive users' attention to critical information in the security dialog • Determine how quickly habituation occurs, and ways to avoid it
  • 45. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/