A Chat at the Old Phishin' Hole
نویسندگان
چکیده
A first contribution of this paper is a theoretical yet practically applicable model covering a large set of phishing attacks, aimed towards developing an understanding of threats relating to phishing. We model an attack by a phishing graph in which nodes correspond to knowledge or access rights, and (directed) edges correspond to means of obtaining information or access rights from already possessed information or access rights – whether this involves interaction with the victim or not. Edges may also be associated with probabilities, costs, or other measures of the hardness of traversing the graph. This allows us to quantify the effort of traversing a graph from some starting node (corresponding to publicly available information) to a target node that corresponds to access to a resource of the attacker’s choice. We discuss how to perform economic analysis on the viability of attacks. A quantification of the economical viability of various attacks allows a pinpointing of weak links for which improved security mechanisms would improve overall system security. A second contribution of this paper is the description of what we term a context aware phishing attack. This is a particularly threatening attack in that it is likely to be successful not only against the most gullible computer users (as is supported by experimental results we present.) A context aware attack is mounted using messages that somehow – from their context – are expected (or even welcomed) by the victim. To draw a parallel from the physical world, most current phishing attacks can be described as somebody who knocks on your door and says you have a problem with your phone, and that if you let him in, he will repair it. A context aware phishing attack, on the other hand, can be described by somebody who first cuts your phone lines as they enter your home, waits for you to contact the phone company to ask them to come and fix the problem – and then knocks on your door and says he is from the phone company. We can see that observing or manipulating the context allows an attacker to make his victim lower his guards. As a more technical example, we show how to obtain PayPal passwords from eBay users that do not take unusual measures particularly intended to avoid this attack. Finally, a third contribution is a discussion of how to address the threats we describe – both in their specific and generic shapes. A full version of this paper can be downloaded from www.markus-jakobsson.com
منابع مشابه
Cri du Chat Syndrome: a Case Report with Recurrent Pneumonia and Chronic Stridor
Introduction Cri du chat syndrome is a rare genetic disorder due to deletion of variable length of short arm of chromosome 5(5p). It mainly presents with typical cat like cry, facial dysmorphism, poor growth with feeding problems and severe cognitive, speech, and motor delays. Case Report We present here a one year old child who did not presented with typical features but presented with recurre...
متن کاملHealthcare Priority-Setting: Chat-Ting Is Not Enough; Comment on “Swiss-CHAT: Citizens Discuss Priorities for Swiss Health Insurance Coverage”
CHAT has its limits. It is a three-hour exercise. However, the real world problems of healthcare rationing and priority-setting are too complex for a three-hour exercise. What is needed, as a supplement, are sustained processes of rational democratic deliberation that can address the challenges to healthcare justice posed by costly emerging medical technologies, such as these targeted cancer th...
متن کاملStress intensity factor at the hole-edge cracks tips in a finite plate
In the current research work, the problem of fracture mechanics in a plate with a central hole under tensile loading is studied. The stress intensity factors are calculated for a finite plate containing two symmetrical hole-edge cracks. The problem is solved by two different methods, namely the finite element method and the FRANC software analysis. At first the finite element method is used and...
متن کاملSwiss-CHAT: Citizens Discuss Priorities for Swiss Health Insurance Coverage
Background As universal health coverage becomes the norm in many countries, it is important to determine public priorities regarding benefits to include in health insurance coverage. We report results of participation in a decision exercise among residents of Switzerland, a high-income country with a long history of universal health insurance and deliberative democracy. Methods We adapted the...
متن کاملDeveloping a ChatBot to Answer Spatial Queries for use in Location-based Services
A Chat Bot is an automated operator that can interact with customers like a human operator, answer their questions, solve problems and get feedback. Real-time responsiveness, the sense of talking to a human user is one of their good features that can be used to deliver location-based services. This paper designed a Chat Bot that can talk and answer users' questions based on their location. Thi...
متن کاملThe effects of gestational and lactational exposure to Nonylphenol on c-jun, and c-fos expression and learning and memory in hippocampus of male F1 rat
Objective(s): To investigate the effects of Nonylphenol (NP) in pups from dams exposed during gestational and lactational periods on immediate early genes (c-jun, c-fos) in hippocampus and the learning and memory of F1 rats. Materials and Methods: Twenty eight pregnant dams, stratified by pregnancy date, were randomly assigned into 4 groups, which were gavaged with NP at the doses of 50 mg/kg/d...
متن کامل