Securing Password Authentication for Web-based Applications

11/12/2020
by   Teik Guan Tan, et al.
0

The use of passwords and the need to protect passwords are not going away. The majority of websites that require authentication continue to support password authentication. Even high-security applications such as Internet Banking portals, which deploy 2-factor authentication, rely on password authentication as one of the authentication factors. However phishing attacks continue to plague password-based authentication despite aggressive efforts in detection and takedown as well as comprehensive user awareness and training programs. There is currently no foolproof mechanism even for security-conscious websites to prevent users from being directed to fraudulent websites and having their passwords phished. In this paper, we apply a threat analysis on the web password login process, and uncover a design vulnerability in the HTML<inputtype="password"> field. This vulnerability can be exploited for phishing attacks as the web authentication process is not end-to-end secured from each input password field to the web server. We identify four properties that encapsulate the requirements to stop web-based password phishing, and propose a secure protocol to be used with a new credential field that complies with the four properties. We further analyze the proposed protocol through an abuse-case evaluation, discuss various deployment issues, and also perform a test implementation to understand its data and execution overheads

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/24/2018

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring

We present WPSE, a browser-side security monitor for web protocols desig...
research
06/27/2022

FIDO2 With Two Displays-Or How to Protect Security-Critical Web Transactions Against Malware Attacks

With the rise of attacks on online accounts in the past years, more and ...
research
10/17/2022

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)

Heuristics for user experience state that users will transfer their expe...
research
09/01/2021

Let Your Camera See for You: A Novel Two-Factor Authentication Method against Real-Time Phishing Attacks

Today, two-factor authentication (2FA) is a widely implemented mechanism...
research
02/07/2019

Shoulder Surfing: From An Experimental Study to a Comparative Framework

Shoulder surfing is an attack vector widely recognized as a real threat ...
research
01/23/2023

Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing

APIs often transmit far more data to client applications than they need,...
research
12/16/2020

A novel Two-Factor HoneyToken Authentication Mechanism

The majority of systems rely on user authentication on passwords, but pa...

Please sign up or login with your details

Forgot password? Click here to reset