+ All Categories
Home > Documents > Analyzing Websites for User- Visible Security Design Flaws

Analyzing Websites for User- Visible Security Design Flaws

Date post: 12-Sep-2021
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
27
Analyzing Websites for User- Visible Security Design Flaws Laura Falk, Atul Prakash, Kevin Borders University of Michigan Symposium on Usable Privacy and Security July 23-25, 2008
Transcript
Page 1: Analyzing Websites for User- Visible Security Design Flaws

Analyzing Websites for User-Visible Security Design Flaws

Laura Falk, Atul Prakash, Kevin Borders University of Michigan

Symposium on Usable Privacy and Security July 23-25, 2008

Page 2: Analyzing Websites for User- Visible Security Design Flaws

Mo#va#on:Authors’PersonalExperiences

•  On‐linebanking–  Loginboxesoninsecurepages

•  Needtoreachcustomerservice–  Contactinforma#ononaninsecurepage

•  SeDngupre#rementaccounton‐line•  UseridwasSSN

•  Decidedtoanalyzeotherbankstoseeiftheproblemsweremorecommonandifwecouldhelpnudgebanksintherightdirec#on

Page 3: Analyzing Websites for User- Visible Security Design Flaws

Goals

•  Wemostlyfocusonsecurityproblemsthatshouldbevisibletocarefulusersofawebsite•  Mostmakeithardforevencarefuluserstomakecorrectjudgementcalls

•  Wepickedonfinancialsitesbecausetheyareassumedtobedesignedbysecurityexpertsandtheirusersarefrequentlytargeted

Page 4: Analyzing Websites for User- Visible Security Design Flaws

OurStudy

•  Wechosenottoexamine“bugs”orbrowserflaws– E.g.,bufferoverflows,cross‐sitescrip#ng,etc.– Theflawswediscussaffectuserswhoareusingbug‐freeclientsoVware

•  Couldnotanalyzeallflaws(e.g.,thosethatrequireloginatthebanksites)

Page 5: Analyzing Websites for User- Visible Security Design Flaws

Methodology

•  Acombina#onofautomatedandmanualanalysisof214websites(mostlybanks)

•  Sourceoflist:h\p://www.quazell.com/bank/bank‐usa.html

•  Studyini#atedinFallof2006– Used5visibleflawsfoundinini#alanalysisof20sites

– Downloadedwebsitecontentstodisk– Searchedfilescontainingwebpagesusingscripts

Page 6: Analyzing Websites for User- Visible Security Design Flaws

LoginWindowonanInsecurePage

•  Presen#ngsecureloginop#onsoninsecurepage– A\ackercouldmodifyinsecurepage

– Forwardlogincreden#alstoanotherdes#na#on

Page 7: Analyzing Websites for User- Visible Security Design Flaws

ShortVideoIllustra#nganA\ackonInsecureLoginPages

(RecordedonJuly20th,2008)

Page 8: Analyzing Websites for User- Visible Security Design Flaws

ExampleRiskScenario

Coffee Shop

Router/Access Point

Rogue Router/Access Point DNS flaws [see recent bug report by Dan Kaminsky] could potentially allow even remote, large-scale exploits

Page 9: Analyzing Websites for User- Visible Security Design Flaws

ContactInforma#ononanInsecurePage

Page 10: Analyzing Websites for User- Visible Security Design Flaws

Videoillustra#ngthecompromiseof“ContactUs”Pages

(RecordedonJuly20th,2008)

Page 11: Analyzing Websites for User- Visible Security Design Flaws

Shouldthisbeaconcern?

•  Exploitswouldnotbestraighhorward(e.g.,mayrequireseDnguparoguecallcenter),buta\ackersarebecomingmoreorganized– Othercustomerservicechannels,suchaschat,mayalsobecreatedthatcouldbeexploitedcheaply

•  Bo#omLine:Nogoodreasonwhybanksshouldnotsecurelydeliverallcontent

Page 12: Analyzing Websites for User- Visible Security Design Flaws

UseofThird‐PartySites

•  Breakinthechainoftrust– Forwardusertonewpagesthathavedifferentdomains

– OVennono#fica#onofany3rdpartytransi#on– Poten#alforcustomerconfusion

•  Userhasnostraighhorwardwayofknowingif3rdpartydomainistrustworthy

Page 13: Analyzing Websites for User- Visible Security Design Flaws

Example

•  No#cethedomainintheURL

Page 14: Analyzing Websites for User- Visible Security Design Flaws

Example(contd.)

•  Transi#onto3rdpartysite(2006example)

Page 15: Analyzing Websites for User- Visible Security Design Flaws

ShortVideodemonstra#ngUserConfusionwithThird‐Party

Domains(RecordedonJuly24th,2008)

Page 16: Analyzing Websites for User- Visible Security Design Flaws

InformalPoll

•  Visityourbank(s)webpage– Locateloginwindow

•  Isitonaninsecureorsecurepage?– Locatethecontactinforma#on

•  Isitonaninsecureorsecurepage?–  Isyourbankusing3rdpartysites?

•  Wewillaskforashowofhandsfortheseques#onsattheendofthetalk

Page 17: Analyzing Websites for User- Visible Security Design Flaws

PoliciesonUserIdsandPasswords

•  Inadequateorunclearpoliciesforuseridsandpasswords– Somesitesusedsocialsecuritynumbersforlogin(e.g.,TIAA‐CREFin2006.Wecontactedthemaboutit.Sincechangedthepolicy)

– Maynotrequireorrecommendstrongpasswords

Page 18: Analyzing Websites for User- Visible Security Design Flaws

AmbiguityinPolicies

•  E‐mailingsecuritysensi#veinforma#oninsecurely– Sitesofferedtosendstatementsandpasswordsthroughe‐mail

– Asweknowandbanksknow,emailisnotasecuremedium

•  (Caveat:Itispossiblethatthesiteswillonlysendyouano#fica#on,notthetheactualstatement.ButthiswasoVennotapparentfromthewording.)

Page 19: Analyzing Websites for User- Visible Security Design Flaws

Example

•  Offeringtoe‐mailsecuritysensi#veinforma#on

Page 20: Analyzing Websites for User- Visible Security Design Flaws

Results

Specific Design Flaw % of Sites Affected Login window on insecure page 47%

Contact info on insecure page 55%

Inadequate policies on user ids/passwords

28%

E-mailing sensitive information 31%

Use of 3rd party sites 30%

  List of Design Flaws and Percentage of Sites Affected

Page 21: Analyzing Websites for User- Visible Security Design Flaws

KeyPoints

•  Severalofthesedesignflawswerewidespread•  76%hadatatleastonedesignflaw(note:useofnon‐SSLpagesmorecri#calthanothers)

•  Almosthalfthesitespresentedloginboxesoninsecurepages

•  Useof3rdpartydomainswasfairlycommon•  Lessthanhalfsecuredtheircontactinforma#on•  Scopeforimprovementinotherareas,suchasbe\erpoliciesonuserids,passwords,andemailusebythesite

Page 22: Analyzing Websites for User- Visible Security Design Flaws

SomeLimita#onsofOurStudy

•  Wemayhavefailedtocompletelyretrieveallrelevantpages–  Impact:ourresultslikelytounder‐es#mateflaws

•  Onlylookedfinancialins#tu#onsinU.S.– Resultscouldbedifferentinothercountries.

•  Weusedheuris#csforautomatedanalysis– Couldcauseustounderoroveres#mateerrors

•  Humanerrorswherewedidmanualinspec#on

Page 23: Analyzing Websites for User- Visible Security Design Flaws

SomeRelatedWork

•  Usersmaymakeerrorsevenifbanksfixthedesignflaws[Schechteretal.]

•  Implementa#onflawsarealsocommon•  Applica#onlevelwebsitescanners

•  RogeriodePaulaetal.,discoveredthatimplementa#onandintegra#onoftechnicalcomponentsishardwithrespecttosecurity•  Perhaps,banksiteshavemul#pledomainsandadministrators.Noonelookingatthe“bigpicture”

Page 24: Analyzing Websites for User- Visible Security Design Flaws

UsabilityLessonsforWebSites

•  Provideaconsistentexperiencetouserssothatitiseasierforuserstospotdevia#onsfromthenorm– Stayonthesamehostname(www.bank.com)

– Nextbest:www.bank.comtosecure.bank.com– Nextbest:make“properintroduc#on”

•  FromtheoriginaldomainoverHTTPS•  Saywhetherthenewdomaincanbetrusted

– UseSSLthroughoutthesite.

Page 25: Analyzing Websites for User- Visible Security Design Flaws

TheBigPicture–TakeAway

•  Wewanttohelpbanksbythisstudyrecognizetheimportanceofusablesecurity–problemsarecommon

•  Keyrecommenda1ons:–  UseSSLforen#resite(noexcep#ons)–  Discon#nueuseof3rdpartydomainsifpossible(especiallyforservicesforthesamebank)orintroducethemsecurely

–  Improvesecuritypoliciesandstatethemclearly

•  Benefits:Hopefully,thatwillmakeiteasierforcarefulcustomerstono#ceinconsistenciesbecausemostfinancialsiteswilluseasimple,consistentmodel

Page 26: Analyzing Websites for User- Visible Security Design Flaws

InformalPoll

•  Didyourbank’sloginwindowresideonaninsecurepage?

•  Didthecontactinforma#ononyourbank’ssiteresideonaninsecurepage?

•  Didyourbankuse3rdpartydomainsduringauthen#ca#on?

Page 27: Analyzing Websites for User- Visible Security Design Flaws

Ques#ons?


Recommended