Escolar Documentos
Profissional Documentos
Cultura Documentos
markus.jakobsson@parc.com
Adversarial model
E.g., access to data/hardware, ability to corrupt, communication assumptions, goals
Verification methods
Cryptographic reductions to assumptions, BAN logic
Implementation aspects
E.g., will the communication protocol leak information that is considered secret in the application layer?
Deceit
Neglect
Configuration
wardriving rootkitting Shows that more than 50% of APs are vulnerable
With Finn, Johnson: Why and How to Perform Fraud Experiments (IEEE Security and Privacy,March/April 2008)
Experiment Design
Gender Effects
80% 70% 60% Success Rate 50% 40% 30% 20% 10% 0% From Any From Female From Male To Any To Female To Male
To Male From Male From Female From Any 53% 68% 65%
Reality:
1 A 4 eBay
3 credentials
Attack:
1 (spoof) 2 credentials
Experiment:
1 B A
1
5 eBay 4 credentials
Yield (incl spam filtering loss): 11% +-3% eBay greeting removed: same
and Jimmys mothers maiden name: Smith More reading: Griffith and Jakobsson, "Messin' with Texas: Deriving Mother's Maiden Names Using Public Records."
www.browser-recon.info
Why?
Intuition
Preference-based authentication:
preferences are more stable than longterm memory (confirmed by psychology research) preferences are rarely documented (in contrast to city of birth, brand of first car, etc.) especially dislikes!
And next?
http://www. democratic-party.us/LiveEarth
http://www. democratic-party.us/LiveEarth
Countermeasures?
Technical
Better filters CardSpace OpenId
Educational
SecurityCartoon Suitable user interfaces
Legal
Interesting?
Internships at PARC / meet over coffee / etc.
markus.jakobsson@parc.com