Phish and HIPs: Human interactive proofs to detect phishing attacks

42Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer. This type of HIP can be used to detect phishing attacks, in which websites are spoofed in order to trick users into revealing private information. We define five properties of an ideal HIP to detect phishing attacks. Using these properties, we evaluate existing and proposed anti-phishing schemes to discover their benefits and weaknesses. We review a new anti-phishing proposal, Dynamic Security Skins (DSS), and show that it meets the HIP criteria. Our goal is to allow a remote server to prove its identity in a way that is easy for a human user to verify and hard for an attacker to spoof. In our scheme, the web server presents its proof in the form of an image that is unique for each user and each transaction. To authenticate the server, the user can visually verify that the image presented by the server matches a reference image presented by the browser. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Dhamija, R., & Tygar, J. D. (2005). Phish and HIPs: Human interactive proofs to detect phishing attacks. In Lecture Notes in Computer Science (Vol. 3517, pp. 127–141). Springer Verlag. https://doi.org/10.1007/11427896_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free