Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks

09/01/2021
by   Yuanyi Sun, et al.
0

Today, two-factor authentication (2FA) is a widely implemented mechanism to counter phishing attacks. Although much effort has been investigated in 2FA, most 2FA systems are still vulnerable to carefully designed phishing attacks, and some even request special hardware, which limits their wide deployment. Recently, real-time phishing (RTP) has made the situation even worse because an adversary can effortlessly establish a phishing website replicating a target website without any background of the web page design technique. Traditional 2FA can be easily bypassed by such RTP attacks. In this work, we propose a novel 2FA system to counter RTP attacks. The main idea is to request a user to take a photo of the web browser with the domain name in the address bar as the 2nd authentication factor. The web server side extracts the domain name information based on Optical Character Recognition (OCR), and then determines if the user is visiting this website or a fake one, thus defeating the RTP attacks where an adversary must set up a fake website with a different domain. We prototyped our system and evaluated its performance in various environments. The results showed that PhotoAuth is an effective technique with good scalability. We also showed that compared to other 2FA systems, PhotoAuth has several advantages, especially no special hardware or software support is needed on the client side except a phone, making it readily deployable.

READ FULL TEXT

page 5

page 6

page 7

page 8

page 9

page 11

research
10/04/2021

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Users' website browsing history contains sensitive information, like hea...
research
11/12/2020

Securing Password Authentication for Web-based Applications

The use of passwords and the need to protect passwords are not going awa...
research
07/11/2023

A Blockchain-based two Factor Honeytoken Authentication System

This paper extends and advances our recently introduced two-factor Honey...
research
02/01/2022

A Framework for Server Authentication using Communication Protocol Dialects

In today's world, computer networks have become vulnerable to numerous a...
research
01/20/2018

Web password recovery --- a necessary evil?

Web password recovery, enabling a user who forgets their password to re-...
research
12/04/2021

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Phishing attacks continue to be a significant threat on the Internet. Pr...

Please sign up or login with your details

Forgot password? Click here to reset