skip to main content
10.1145/1408664.1408680acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Analyzing websites for user-visible security design flaws

Published:23 July 2008Publication History

ABSTRACT

An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42% of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously testing their sites for security flaws. In spite of this testing, some design flaws still remain that prevent secure usage. In this paper, we examine the prevalence of user-visible security design flaws by looking at sites from 214 U.S. financial institutions. We specifically chose financial websites because of their high security requirements. We found a number of flaws that may lead users to make bad security decisions, even if they are knowledgeable about security and exhibit proper browser use consistent with the site's security policies. To our surprise, these design flaws were widespread. We found that 76% of the sites in our survey suffered from at least one design flaw. This indicates that these flaws are not widely understood, even by experts who are responsible for web security. Finally, we present our methodology for testing websites and discuss how it can help systematically discover user-visible security design flaws.

References

  1. Banking study: list of financial institutions. http://www.eecs.umich.edu/~laura/webusability/websites.html.Google ScholarGoogle Scholar
  2. L. Cranor, P. Guduru, and M. Arjula. User interfaces for privacy agents. ACM Transactions on Computer Human Interaction, 12(2):135--178, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. de Paula and et. al. Two experiences designing for effective security. In SOUPS '05: Proceedings of the second symposium on Usable privacy and security, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Dhamija, J. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. S. Downs, M. B. Holbrook, and L. F. Cranor. Decision strategies and susceptibility to phishing. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Florencio and B. C. Cormac Herley. Do strong web passwords accomplish anything? In Proceedings of the USENIX Workshop on Hot Topics in Security (HotSec), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Freed. State of customer satisfaction with online banking, forsee results/forbes.com, April 2007.Google ScholarGoogle Scholar
  8. K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Banking on the www - banks of the usa. http://www.quazell.com/bank/bank_usa.html.Google ScholarGoogle Scholar
  10. P. McDaniel. On context in authorization policy. In Proc. of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 80--89, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nessus Vulnerability Scanner. http://www.nessus.org.Google ScholarGoogle Scholar
  12. B. Pinkas and T. Sanders. Securing passwords against dictionary attacks. In ACM CCS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser analysis of web-based malware. In Proceedings of the USENIX Workshop on Hot topics in Understand Botnets (HotBots), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators: An evaluation of website authentication and the effect of role playing on usability studies. In IEEE Symposium on Security and Privacy, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor's new security indicators. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51--65, Washington, DC, USA, 2007. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. In Proc. of The 2nd Usenix Workshop on Electronic Commerce, Nov. 1996. Revised April, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. WatchFire's AppScan Product.Google ScholarGoogle Scholar
  18. A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Wu, R. C. Miller, and S. L. Garfinkel. Do security toolbars actually prevent phishing attacks? In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 601--610, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Why Use YURLs?, 2003. http://www.waterken.com/dev/YURL/Why/.Google ScholarGoogle Scholar

Index Terms

  1. Analyzing websites for user-visible security design flaws

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security
          July 2008
          145 pages
          ISBN:9781605582764
          DOI:10.1145/1408664

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 July 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader