skip to main content
10.1145/1124772.1124863acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Do security toolbars actually prevent phishing attacks?

Published:22 April 2006Publication History

ABSTRACT

Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, they should be evaluated for usability -- that is, whether these toolbars really prevent users from being tricked into providing personal information. We conducted two user studies of three security toolbars and other browser security indicators and found them all ineffective at preventing phishing attacks. Even though subjects were asked to pay attention to the toolbar, many failed to look at it; others disregarded or explained away the toolbars' warnings if the content of web pages looked legitimate. We found that many subjects do not understand phishing attacks or realize how sophisticated such attacks can be.

References

  1. Anti-Phishing Working Group. eBay -- NOTICE eBay Obligatory Verifying - Invalid User Information. March 9, 2004. http://www.antiphishing.org/phishing_archive/ eBay_03-09-04.htmGoogle ScholarGoogle Scholar
  2. Anti-Phishing Working Group. Phishing Activity Trends Report, March 2005. http://antiphishing.org/ APWG_Phishing_Activity_Report_March_2005.pdfGoogle ScholarGoogle Scholar
  3. Bank, D. 'Spear Phishing' Tests Educate People About Online Scams. The Wall Street Journal. August 17, 2005.Google ScholarGoogle Scholar
  4. BBC News. Passwords revealed by sweet deal. http://news.bbc.co.uk/1/hi/technology/3639679.stmGoogle ScholarGoogle Scholar
  5. Chou, N., Ledesma, R., Teraguchi, Y., Mitchell, J.C. Client-Side Defense Against Web-Based Identity Theft. 11th Annual Network and Distributed System Security Symposium (2004).Google ScholarGoogle Scholar
  6. Dhamija, R. Tygar, J.D. The Battle Against Phishing: Dynamic Security Skins. Symposium on Usable Privacy and Security (2005), pp. 77--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. eBay Toolbar and Account Guard. http://pages. ebay.com/help/confidence/account-guard.htmlGoogle ScholarGoogle Scholar
  8. Emigh, A. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. ITTC Report on Online Identity Theft Technology and Countermeasures. October 3, 2005. http://www.antiphishing.org/Phishing-dhs-report.pdfGoogle ScholarGoogle Scholar
  9. Federal Bureau of Investigation, Department of Justice. FBI Says Web 'Spoofing' Scams are a Growing Problem. 2003. http://www.fbi.gov/pressrel/pressrel03 /spoofing072103.htmGoogle ScholarGoogle Scholar
  10. Fluendy, S. Phishing targeting online outlets. Computer Crime Research Center. March 16, 2005. http://www. crime-research.org/news/03.16.2005/1050/Google ScholarGoogle Scholar
  11. Fogg, B.J, et al. What makes Web sites credible?: a report on a large quantitative study. CHI 2001, pp. 61--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Google Safe Browsing for Firefox. 2005. http://www.google.com/tools/firefox/safebrowsing/.Google ScholarGoogle Scholar
  13. Herzberg, A., Gbara, A. TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks. 2004. http://www.cs.biu.ac.il/~herzbea/Papers/ecommerce/spoofing.htm.Google ScholarGoogle Scholar
  14. Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F. Social Phishing. School of Informatics & Dept. of Computer Science, Indiana University. 2005. http:// informatics.indiana.edu/fil/Net/social_phishing.pdfGoogle ScholarGoogle Scholar
  15. Leyden, J. US phishing losses hit $500m. The Register. September 29, 2004.Google ScholarGoogle Scholar
  16. Netcraft Toolbar. 2004. http://toolbar.netcraft.com/.Google ScholarGoogle Scholar
  17. Norman, D. A. Design rules based on analyses of human error. CACM, v26 n4 (April 1983), pp. 254--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. PassMark. 2005. http://www.passmarksecurity.com/Google ScholarGoogle Scholar
  19. Sharif, T. Phishing Filter in IE7, September 9, 2006. http://blogs.msdn.com/ie/archive/2005/09/09/463204.aspxGoogle ScholarGoogle Scholar
  20. SpoofStick. 2004. http://www.spoofstick.com/.Google ScholarGoogle Scholar
  21. Sullivan, B. Consumers still falling for phish. MSNBC. July 28, 2004. http://www.msnbc.msn.com/id/5519990/Google ScholarGoogle Scholar
  22. Whalen, T., Inkpen, K. Gathering Evidence: Use of Visual Security Cues in Web Browsing. Graphics Interface 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Whitten, A., Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. 8th Usenix Security Symposium, 1999, pp. 169--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Wu, M., Garfinkel, S., Miller, R. Secure Web Authentication with Mobile Phones. DIMACS Workshop on Usable Privacy and Security Software, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Do security toolbars actually prevent phishing attacks?

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2006
        1353 pages
        ISBN:1595933727
        DOI:10.1145/1124772

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 April 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader