Email-based password recovery - risking or rescuing users?

被引:0
|
作者
Al Maqbali, Fatma [1 ]
Mitchell, Chris J. [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, London, England
关键词
password recovery; email-based password recovery; content and design of email-based password recovery;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secret passwords are very widely used for user authentication to websites, despite their known shortcomings. Most websites using passwords also implement password recovery to allow users to re-establish a shared secret if the existing value is forgotten; many such systems involve sending a password recovery email to the user, e.g. containing a secret link. The security of password recovery, and hence the entire user-website relationship, depends on the email being acted upon correctly; unfortunately, as we show, such emails are not always designed to maximise security and can introduce vulnerabilities into recovery. To understand better this serious practical security problem, we surveyed password recovery emails for 50 of the top English language websites. We investigated a range of security and usability issues for such emails, covering their design, structure and content (including the nature of the user instructions), the techniques used to recover the password, and variations in email content from one web service to another. Many well-known web services, including Facebook, Dropbox, and Microsoft, suffer from recovery email design, structure and content issues. This is, to our knowledge, the first study of its type reported in the literature. This study has enabled us to formulate a set of recommendations for the design of such emails.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [1] You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures
    Innocenti, Tommaso
    Mirheidari, Seyed Ali
    Kharraz, Amin
    Crispo, Bruno
    Kirda, Engin
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021, 2021, 12756 : 1 - 20
  • [2] An email-based interoperability approach for SMEs
    Burkhart, Thomas
    Werth, Dirk
    Balzert, Silke
    Loos, Peter
    I-ESA 2009: INTERNATIONAL CONFERENCE ON INTEROPERABILITY FOR ENTERPRISE SOFTWARE AND APPLICATIONS CHINA, PROCEEDINGS, 2009, : 245 - 251
  • [3] A Literature Review of Email-based Telemedicine
    Caffery, Liam J.
    Smith, Anthony C.
    GLOBAL TELEHEALTH, 2010, 161 : 20 - 34
  • [4] A Hybrid Approach to Combat Email-based Cyberstalking
    Ghasem, Zinnar
    Frommholz, Ingo
    Maple, Carsten
    2015 FOURTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2015,
  • [5] A Transmission Security Framework for Email-based Telemedicine
    Caffery, Liam J.
    Smith, Anthony C.
    GLOBAL TELEHEALTH, 2010, 161 : 35 - 48
  • [6] Curated Email-Based Code Reviews Datasets
    Liang, Mingzhao
    Charoenwet, Wachiraphan
    Thongtanunam, Patanamon
    2024 IEEE/ACM 21ST INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2024, : 294 - 298
  • [7] Structural Changes in an Email-Based Social Network
    Juszczyszyn, Krzysztof
    Musial, Katarzyna
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2009, 5559 : 40 - 49
  • [8] On Measuring Email-based Social Network Trust
    Huang, Dijiang
    Arasan, Vetri
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [9] Email-based Negotiation to Facilitate Collaboration in SME Networks
    Wajid, Usman
    de la Hidalga, Abraham Nieva
    Carpenter, Martin
    Marin, Cesar A.
    2011 20TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2011, : 19 - 24
  • [10] Secure email-based peer to peer information retrieval
    Lu, CY
    Geva, S
    2005 International Conference on Cyberworlds, Proceedings, 2005, : 531 - 538