W3C home > Mailing lists > Public > public-wsc-wg@w3.org > April 2007

"The Emperor's New Security Indicators"

From: <michael.mccormick@wellsfargo.com>
Date: Thu, 12 Apr 2007 18:03:40 -0500
Message-ID: <8A794A6D6932D146B2949441ECFC9D6802B4D390@msgswbmnmsp17.wellsfargo.com>
To: <public-wsc-wg@w3.org>
http://www.usablesecurity.org/emperor/emperor.pdf


Abstract
We evaluate website authentication measures that are
designed to protect users from man-in-the-middle, 'phishing',
and other site forgery attacks. We asked 67 bank
customers to conduct common online banking tasks. Each
time they logged in, we presented increasingly alarming
clues that their connection was insecure. First, we removed
HTTPS indicators. Next, we removed the participant's
site-authentication image-the customer-selected
image that many websites now expect their users to verify
before entering their passwords. Finally, we replaced
the bank's password-entry page with a warning page. After
each clue, we determined whether participants entered
their passwords or withheld them.
We also investigate how a study's design affects participant
behavior: we asked some participants to play a role
and others to use their own accounts and passwords. We
also presented some participants with security-focused instructions.
We confirm prior findings that users ignore HTTPS indicators:
no participants withheld their passwords when
these indicators were removed. We present the first empirical
investigation of site-authentication images, and we find
them to be ineffective: even when we removed them, 23 of
the 25 (92%) participants who used their own accounts entered
their passwords. We also contribute the first empirical
evidence that role playing affects participants' security behavior:
role-playing participants behaved significantly less
securely than those using their own passwords.
Received on Thursday, 12 April 2007 23:03:45 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Tuesday, 5 February 2008 03:52:46 GMT