Proceedings of the 18th International Conference on World Wide Web 2009
DOI: 10.1145/1526709.1526898
|View full text |Cite
|
Sign up to set email alerts
|

PAKE-based mutual HTTP authentication for preventing phishing attacks

Abstract: This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 3 publications
1
3
0
Order By: Relevance
“…For example, our results justify the general approach behind the proposals by Oiwa et al' [7,[36][37][38] and by Dacosta et al [18]. We caution that our theorems, which make use of security models for tPAuth and tPAKE, do not immediately imply security of those particular protocols.…”
Section: Contributionssupporting
confidence: 65%
See 1 more Smart Citation
“…For example, our results justify the general approach behind the proposals by Oiwa et al' [7,[36][37][38] and by Dacosta et al [18]. We caution that our theorems, which make use of security models for tPAuth and tPAKE, do not immediately imply security of those particular protocols.…”
Section: Contributionssupporting
confidence: 65%
“…Oiwa et al [7,[36][37][38] published an Internet-Draft that employs an ISOstandardized PAKE protocol (KAM3 [26, Sect. 6.3], [32]) and binds it to the TLS channel using either the server's certificate or the TLS master secret key, but no formal justification is given for security of the combined construction.…”
Section: Running Pake At the Application Layermentioning
confidence: 99%
“…TLS-SA, however, requires client certificates and hardware tokens to resist offline dictionary attacks, affecting its adoption. Finally, the Mutual Authentication Protocol for HTTP [31] also combines user authentication with SSL/TLS channel binding, but it relies on the user's password instead of client certificates. To provide mutual authentication and prevent offline guessing attacks, this mechanism relies on the direct implementation of a PAKE protocol.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, social engineering, one of the most severe threats in the cyber spaces, is used for both identity theft and malware infection in which the targets are human rather than computer systems. The research vectors against the attack are development of educational materials [5], [6], user interface for end users [7], [8], and detection methods [9]. Especially, the interface studies investigated the reasons of users' misoperations [10] and misjudgments [11].…”
Section: Related Workmentioning
confidence: 99%