Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks

Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billio...

Full description

Bibliographic Details
Main Author: Henshaw, James Presley
Format: Others
Published: BYU ScholarsArchive 2005
Subjects:
Online Access:https://scholarsarchive.byu.edu/etd/322
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd
id ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-1321
record_format oai_dc
spelling ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-13212019-05-16T03:21:28Z Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks Henshaw, James Presley Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to bypass CTTN's filter. To increase the security of CTTN, this thesis introduces Phishing Warden, a browser-plug-in that filters content before client-side scripts can execute, thereby preventing the scripts from obfuscating data in order to bypass the filter. Phishing Warden negotiates the release of sensitive data through web forms via the AutoFill button. After Phishing Warden determines the web server is trustworthy of the requested information, the sensitive data is automatically inserted into the form, indirectly informing the user that Phishing Warden trusts the server with this information. Besides potentially obfuscating data, scripts in Internet browsers can exploit security vulnerabilities which allow malicious scripts to potentially take over the computer, or deceive the user with a fake toolbar [31]. In addition to preventing data obfuscation by client-side scripts, Phishing Warden also allows a user to customize script control with the push of a button, letting the user decide which websites to trust enough to run scripts. Phishing Warden extends CTTN to remember past sites deemed trustworthy by the user. 2005-06-01T07:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/322 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd http://lib.byu.edu/about/copyright/ All Theses and Dissertations BYU ScholarsArchive phishing internet security trust negotiation Phishing Warden Computer Sciences
collection NDLTD
format Others
sources NDLTD
topic phishing
internet security
trust negotiation
Phishing Warden
Computer Sciences
spellingShingle phishing
internet security
trust negotiation
Phishing Warden
Computer Sciences
Henshaw, James Presley
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
description Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to bypass CTTN's filter. To increase the security of CTTN, this thesis introduces Phishing Warden, a browser-plug-in that filters content before client-side scripts can execute, thereby preventing the scripts from obfuscating data in order to bypass the filter. Phishing Warden negotiates the release of sensitive data through web forms via the AutoFill button. After Phishing Warden determines the web server is trustworthy of the requested information, the sensitive data is automatically inserted into the form, indirectly informing the user that Phishing Warden trusts the server with this information. Besides potentially obfuscating data, scripts in Internet browsers can exploit security vulnerabilities which allow malicious scripts to potentially take over the computer, or deceive the user with a fake toolbar [31]. In addition to preventing data obfuscation by client-side scripts, Phishing Warden also allows a user to customize script control with the push of a button, letting the user decide which websites to trust enough to run scripts. Phishing Warden extends CTTN to remember past sites deemed trustworthy by the user.
author Henshaw, James Presley
author_facet Henshaw, James Presley
author_sort Henshaw, James Presley
title Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
title_short Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
title_full Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
title_fullStr Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
title_full_unstemmed Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
title_sort phishing warden: enhancing content-triggered trust negotiation to prevent phishing attacks
publisher BYU ScholarsArchive
publishDate 2005
url https://scholarsarchive.byu.edu/etd/322
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd
work_keys_str_mv AT henshawjamespresley phishingwardenenhancingcontenttriggeredtrustnegotiationtopreventphishingattacks
_version_ 1719185551010037760