A Transcontinental Analysis of Account Remediation Protocols of Popular Websites

02/02/2023
by   Philipp Markert, et al.
0

Websites are used regularly in our day-today lives, yet research has shown that it is challenging for many users to use them securely, e.g., most prominently due to weak passwords through which they access their accounts. At the same time, many services employ low-security measures, making their users even more prone to account compromises with little to no means of remediating compromised accounts. Additionally, remediating compromised accounts requires users to complete a series of steps, ideally all provided and explained by the service. However, for U.S.-based websites, prior research has shown that the advice provided by many services is often incomplete. To further understand the underlying issue and its implications, this paper reports on a study that analyzes the account remediation procedure covering the 50 most popular websites in 30 countries, 6 each in Africa, the Americas, Asia, Europe, and Oceania. We conducted the first transcontinental analysis on the account remediation protocols of popular websites. The analysis is based on 5 steps websites need to provide advice for: compromise discovery, account recovery, access limitation, service restoration, and prevention. We find that the lack of advice prior work identified for websites from the U.S. also holds across continents, with the presence ranging from 37 we identified considerable differences when comparing countries and continents, with countries in Africa and Oceania significantly more affected by the lack of advice. To address this, we suggest providing publicly available and easy-to-follow remediation advice for users and guidance for website providers so they can provide all the necessary information.

READ FULL TEXT

page 1

page 5

page 6

page 13

page 14

research
01/09/2023

Quantifying User Password Exposure to Third-Party CDNs

Web services commonly employ Content Distribution Networks (CDNs) for pe...
research
06/16/2023

Lost and not Found: An Investigation of Recovery Methods for Multi-Factor Authentication

Multi-Factor Authentication is intended to strengthen the security of pa...
research
11/24/2021

Third-party Service Dependencies and Centralization Around the World

There is a growing concern about consolidation trends in Internet servic...
research
11/02/2018

Performance Evaluation of Shared Hosting Security Methods

Shared hosting is a kind of web hosting in which multiple websites resid...
research
09/06/2021

Examining the tech stacks of Czech and Slovak untrustworthy websites

The burgeoning of misleading or false information spread by untrustworth...
research
11/13/2021

Evaluating the effectiveness of Phishing Reports on Twitter

Phishing attacks are an increasingly potent web-based threat, with nearl...
research
09/01/2019

WhiteNet: Phishing Website Detection by Visual Whitelists

Phishing websites aiming at stealing users' information by claiming fake...

Please sign up or login with your details

Forgot password? Click here to reset