Visual security is feeble for Anti-Phishing

被引:0
|
作者
Leung, Chun-Ming [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
关键词
Phishing; Man-In-The-Middle (MITM); CAPTCHA; Authentication; Implementation Flaw; Online Banking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Addressing recent online banking threats, the banking industry offers us several solutions for our safety online banking experience, however those solutions may not finally secure the users under the rising threats. The main challenges are how to enable safe online banking on a compromised host, and solving the general ignorance of security warning. CAPTCHA is primarily used to anti hot automated login, also, CAPTCHA base application can further provides secure PIN input against keylogger and mouse-logger for Bank's customer[1]. Assuming users are always unconscious of security warning in our model, we have designed a series of attacks and defenses under this interesting condition. In this work, we will start by formalizing a security defense utilizing CAPCTCHA, its limitations are analyzed; Then, we will attack a local bank employing CAPTCHA solution, which we show how its can be bypassed from its vulnerability in its implementation. We further introduce - Control-Relaying Man-In-The-Middle(CR-MITM) attack, a remote attack just like a Remote Terminal Service that can capture and relay user inputs without local Trojan assistant, which is possible to defeat CAPTCHA phishing protection in the future. Under our model, we conclude, visual security defense alone is feeble for anti-phishing.
引用
收藏
页码:118 / 123
页数:6
相关论文
共 50 条
  • [1] Classification of Anti-phishing Solutions
    Chanti S.
    Chithralekha T.
    [J]. SN Computer Science, 2020, 1 (1)
  • [2] A Secured Methodology for Anti-Phishing
    Churi, Tanvi
    Sawardekar, Pranay
    Pardeshi, Abhijeet
    Vartak, Pallavi
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [3] Anti-Phishing in Offense and Defense
    Yue, Chuan
    Wang, Haining
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 345 - 354
  • [4] Anti-phishing: A comprehensive perspective
    Varshney, Gaurav
    Kumawat, Rahul
    Varadharajan, Vijay
    Tupakula, Uday
    Gupta, Chandranshu
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 238
  • [5] Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications
    Marforio, Claudio
    Masti, Ramya Jayaram
    Soriente, Claudio
    Kostiainen, Kari
    Capkun, Srdjan
    [J]. 34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, : 540 - 551
  • [6] Visual Similarity based Anti-Phishing with the Combination of Local and Global Features
    Zhou, Yu
    Zhang, Yongzheng
    Xiao, Jun
    Wang, Yipeng
    Lin, Weiyao
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 189 - 196
  • [7] Textual and Visual Content-Based Anti-Phishing: A Bayesian Approach
    Zhang, Haijun
    Liu, Gang
    Chow, Tommy W. S.
    Liu, Wenyin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2011, 22 (10): : 1532 - 1546
  • [8] NoPhish: An anti-phishing education app
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 88 - 192
  • [9] NoPhish: An Anti-Phishing Education App
    Canova, Gamze
    Volkamer, Melanie
    Bergmann, Clemens
    Borza, Roland
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 188 - 192
  • [10] Some thoughts about anti-phishing
    Jenq, John
    Cheng, Rex
    [J]. 3RD INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS, AND APPLICAT/4TH INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, 2006, : 181 - 185