810 likes | 958 Views
Trust and Semantic attacks . Ponnurangam Kumaraguru (PK) Usable, Privacy, and Security Mar 17, 2008. Who am I? . Ph.D. candidate in the Computation, Organizations, and Society program in the School of Computer Science
E N D
Trust and Semantic attacks Ponnurangam Kumaraguru (PK) Usable, Privacy, and Security Mar 17, 2008
Who am I? • Ph.D. candidate in the Computation, Organizations, and Society program in the School of Computer Science • Research interests - Privacy, Security, Trust, Human Computer Interaction, and Learning Science
Outline • Trust • Semantic attacks - Phishing • User education • Learning science • Evaluating embedded training • Ongoing work • Conclusion
What is trust? • No single definition • Depends on the situation and the problem • Many models developed • Very few models evaluated
Trust in literature • Economics (how trust affects transactions) • Reputation • Marketing (how to build trust) • Persuasion • HCI (what affects trust) • Design • Psychology (positive theory) • Intimacy
Trust Models • Positive antecedents • Benevolence • Comprehensive information • Credibility • Familiarity • Good feedback • Propensity • Reliability • Usability • Willingness to transact • … • Negative antecedents • Risk • Transaction cost • Uncertainty • …
How do users make decisions? • Interview design, 25 participants (11 - experts and 14 - non-experts) • Measured the strategies and decision process of the users in online situations • Results • Non-experts wanted advice to help them make better trust decisions • Non-experts used significantly fewer meaningful signals compared to experts P. Kumaraguru, A. Acquisti, and L. Cranor. Trust modeling for online transactions: A phishing scenario. In Privacy Security Trust, Oct 30 - Nov 1, 2006, Ontario, Canada.
Expert model Unknown states Not deliberate states Signals States that affect decision States that affect well-being Meaningful signals Misleading signals Missed signals
Non- expert model Unknown states Not deliberate states Signals States that affect decision States that affect well-being Misleading signals Meaningful signals Missed signals
Outline • Trust • Semantic attacks - Phishing • User education • Learning science • Evaluating embedded training • Ongoing work • Conclusion
Security Attacks: Waves • Physical: attack the computers, wires and electronics • E.g. physically cutting the network cable • Syntactic: attack operating logic of the computers and networks • E.g. buffer overflows, DDoS • Semantic: attack the user not the computers • E.g. Phishing http://www.schneier.com/essay-035.html
Semantic Attacks • “Target the way we, as humans, assign meaning to content.” • System and mental model http://groups.csail.mit.edu/uid/projects/phishing/proposal.pdf
Features in the email Subject: eBay: Urgent Notification From Billing Department
Features in the email We regret to inform you that you eBay account could be suspended if you don’t update your account information.
Features in the email https://signin.ebay.com/ws/eBayISAPI.dll?SignIn&sid=verify&co_partnerid=2&sidteid=0
Website to collect information http://www.kusi.org/hcr/eBay/ws23/eBayISAPI.htm
What is phishing? Phishing is “a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them.” Financial Services Technology Consortium. Understanding and countering the phishing threat: A financial service industry perspective. 2005.
Phishing Attack Life Cycle Post Attack Planning Fraud & Abuse Setup Collection Attack Source:http://www.coopercain.com/User%20Data/A%20Leisurely%20Lunch%20Time%20Phishing%20Trip-show.ppt
A few statistics on phishing • 73 million US adults received more than 50 phishing emails each in the year 2005 • Gartner in 2006 found 30% users changed online banking behavior because of attacks like phishing • Gartner in 2006 predicted $2.8 billion loss due to phishing in that year
Why phishing is a hard problem? • Semantic attacks take advantage of the way humans interact with computers • Phishing is one type of semantic attack • Phishers make use of the trust that users have on legitimate organizations
Three strategies for usable privacy and security • Invisible strategy • Regulatory solution • Detecting and deleting the emails • User interface based • Toolbars • Training users
Our Multi-Pronged Approach • Human side • Interviews to understand decision-making • PhishGuru embedded training • Anti-Phishing Phil game • Understanding effectiveness of browser warnings • Computer side • PILFER email anti-phishing filter • CANTINA web anti-phishing algorithm Automate where possible, support where necessary
Outline • Trust • Semantic attacks - Phishing • User education • Learning science • Evaluating embedded training • Ongoing work • Conclusion
Why user education is hard? • Security is a secondary task • Users not motivated to taking time for education • Non-existence of an effective method
To address the open questions • Embedded training methodology • Make the training part of primary task • Create motivation among users • Learning science • Principles for designing training interventions
Approaches for training • Posting articles • FTC,… • Phishing IQ tests • Mail Frontier, … • Classroom training (Robila et al.) • Sending security notices http://www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm http://www.sonicwall.com/phishing/ http://pages.ebay.com/education/spooftutorial/
Security notices • How to spot an email • How to report spoof email • Five ways to protect yourself from identity theft
Outline • Trust • Semantic attacks - Phishing • User education • Learning science • Evaluating embedded training • Ongoing work • Conclusion
Why learning science? • Research on how people gain knowledge and learn new skills • ACT-R theory of cognition and learning • Declarative knowledge (knowing that) • Procedural knowledge (knowing how) • Learning science principles
Learning science principles • Learning-by-doing • More practice better performance • Story-based agent • Using agents in a story-based content enhances user learning • Immediate feedback • Feedback during learning phase results in efficient learning Clark, R.C., and Mayer, R.E. E-Learning and the science of instruction: proven guidelines for consumers and designers of multimedia learning. John Wiley & Sons, Inc., USA, 2002.
Learning science principles • Conceptual-procedural • Presenting procedural materials in between conceptual materials helps better learning • Contiguity • Learning increases when words and pictures are presented contiguously than isolated • Personalization • Using conversational style rather than formal style enhances learning Clark, R.C., and Mayer, R.E. E-Learning and the science of instruction: proven guidelines for consumers and designers of multimedia learning. John Wiley & Sons, Inc., USA, 2002.
Outline • Trust • Semantic attacks - Phishing • User education • Learning science • Evaluating embedded training • Ongoing work • Conclusion
Design constraints • People don’t proactively read the training materials on the web • People can learn from web-based training materials, if only we could get people to read them! (Kumaraguru et al.) • P. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. Teaching Johnny Not to Fall for Phish. • Tech. rep., Cranegie Mellon University, 2007. http://www.cylab.cmu.edu/files/cmucylab07003.pdf.
Embedded training • We know people fall for phishing emails • So make the training available through the phishing emails • Training materials are presented when the users actually fall for phishing emails • Makes training part of primary task • Creates motivation among users • Applies learning-by-doing and immediate feedback principle
Embedded training example Subject: Revision to Your Amazon.com Information
Embedded training example Subject: Revision to Your Amazon.com Information Please login and enter your information http://www.amazon.com/exec/obidos/sign-in.html
Design rationale • What to show in the intervention? • When to show the intervention? • Analyzed instructions from most popular websites • Paper and HTML prototypes, 7 users each • Lessons learned • Two designs • Present the training materials when users click on the link
Study 1: Evaluation of interventions • H1: Security notices are an ineffective medium for training users • H2: Users make better decisions when trained by embedded methodology compared to security notices
Study design • Think aloud study • Role play as Bobby Smith, 19 emails including 2 interventions, and 4 phishing emails • Three conditions: security notices, text / graphics intervention, comic strip intervention • 10 non-expert participants in each condition, 30 total P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CyLab Technical Report. CMU-CyLab-06-017, 2006. http://www.cylab.cmu.edu/default.aspx?id=2253 [to be presented at CHI 2007]
Intervention #1 - Security notices • How to spot an email • How to report spoof email • Five ways to protect yourself from identity theft
Intervention # 2 - Comic strip Applies personalization and story based principle Presents declarative knowledge
Intervention # 2 - Comic strip Applies personalization principle
Intervention # 2 - Comic strip Applies contiguity principle
Intervention # 2 - Comic strip Applies contiguity and conceptual-procedural principle Presents procedural knowledge
Legitimate Phish Training Spam