Trusted paths for browsers

  • Authors:
  • Zishuang (Eileen) Ye;Sean Smith;Denise Anthony

  • Affiliations:
  • Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH;Dartmouth College, Hanover, NH

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Computer security protocols usually terminate in a computer; however, the human-based services which they support usually terminate in a human. The gap between the human and the computer creates potential for security problems. We examine this gap, as it is manifested in secure Web servers. Felten et al. demonstrated the potential, in 1996, for malicious servers to impersonate honest servers. In this paper, we show how malicious servers can still do this---and can also forge the existence of an SSL session and the contents of the alleged server certificate. We then consider how to systematically defend against Web spoofing, by creating a trusted path from the browser to the human user. We present potential designs, propose a new one, prototype it in open-source Mozilla, and demonstrate its effectiveness via user studies.