Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks
Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billio...
Main Author: | |
---|---|
Format: | Others |
Published: |
BYU ScholarsArchive
2005
|
Subjects: | |
Online Access: | https://scholarsarchive.byu.edu/etd/322 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd |
id |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-1321 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-13212019-05-16T03:21:28Z Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks Henshaw, James Presley Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to bypass CTTN's filter. To increase the security of CTTN, this thesis introduces Phishing Warden, a browser-plug-in that filters content before client-side scripts can execute, thereby preventing the scripts from obfuscating data in order to bypass the filter. Phishing Warden negotiates the release of sensitive data through web forms via the AutoFill button. After Phishing Warden determines the web server is trustworthy of the requested information, the sensitive data is automatically inserted into the form, indirectly informing the user that Phishing Warden trusts the server with this information. Besides potentially obfuscating data, scripts in Internet browsers can exploit security vulnerabilities which allow malicious scripts to potentially take over the computer, or deceive the user with a fake toolbar [31]. In addition to preventing data obfuscation by client-side scripts, Phishing Warden also allows a user to customize script control with the push of a button, letting the user decide which websites to trust enough to run scripts. Phishing Warden extends CTTN to remember past sites deemed trustworthy by the user. 2005-06-01T07:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/322 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd http://lib.byu.edu/about/copyright/ All Theses and Dissertations BYU ScholarsArchive phishing internet security trust negotiation Phishing Warden Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
phishing internet security trust negotiation Phishing Warden Computer Sciences |
spellingShingle |
phishing internet security trust negotiation Phishing Warden Computer Sciences Henshaw, James Presley Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
description |
Phishing attacks are spam e-mails that attempt to fool recipients into divulging their identifying information by posing as a message from a well known company and using that company's branding and logos. It is estimated that phishing attacks have cost bank and credit card customers $1.2 billion in the U.S. in 2003. Previous work, content-triggered trust negotiation (CTTN), filters Internet traffic for sensitive data, and prevents a user from disclosing sensitive information to an un-trusted server. However, existing CTTN implementations are vulnerable to client-side scripts that obfuscate any data the client's browser sends to the web server in order to bypass CTTN's filter. To increase the security of CTTN, this thesis introduces Phishing Warden, a browser-plug-in that filters content before client-side scripts can execute, thereby preventing the scripts from obfuscating data in order to bypass the filter. Phishing Warden negotiates the release of sensitive data through web forms via the AutoFill button. After Phishing Warden determines the web server is trustworthy of the requested information, the sensitive data is automatically inserted into the form, indirectly informing the user that Phishing Warden trusts the server with this information. Besides potentially obfuscating data, scripts in Internet browsers can exploit security vulnerabilities which allow malicious scripts to potentially take over the computer, or deceive the user with a fake toolbar [31]. In addition to preventing data obfuscation by client-side scripts, Phishing Warden also allows a user to customize script control with the push of a button, letting the user decide which websites to trust enough to run scripts. Phishing Warden extends CTTN to remember past sites deemed trustworthy by the user. |
author |
Henshaw, James Presley |
author_facet |
Henshaw, James Presley |
author_sort |
Henshaw, James Presley |
title |
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
title_short |
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
title_full |
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
title_fullStr |
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
title_full_unstemmed |
Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks |
title_sort |
phishing warden: enhancing content-triggered trust negotiation to prevent phishing attacks |
publisher |
BYU ScholarsArchive |
publishDate |
2005 |
url |
https://scholarsarchive.byu.edu/etd/322 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=1321&context=etd |
work_keys_str_mv |
AT henshawjamespresley phishingwardenenhancingcontenttriggeredtrustnegotiationtopreventphishingattacks |
_version_ |
1719185551010037760 |