usenix conference policies
The Effect of Repeated Login Prompts on Phishing Susceptibility
Peter Snyder, University of Illinois at Chicago; Michael K. Reiter, University of North Carolina at Chapel Hill; Chris Kanich, University of Illinois at Chicago
Background. Understanding the human aspects of phishing susceptibility is an important component in building effective defenses. People type passwords so often that it is possible that this act makes each individual password less safe from phishing attacks.
Aim. This study investigated whether the act of re-authenticating to password-based login forms causes users to become less vigilant toward impostor sites, thus making them more susceptible to phishing attacks. Our goal was to determine whether users who type their passwords more often are more susceptible to phishing than users who type their passwords less often. If so, this result could lead to theoretically well-grounded best practices regarding login-session length limits and re-authentication practices.
Method. We built a custom browser extension which logs password entry events and has the capability of shortening session times for a treatment group of users. We recruited subjects from our local campus population, and had them run the extension for two months. After this time, we conducted a synthetic phishing attack on all research subjects, followed by a debriefing. Our research protocol was approved by the University’s IRB.
Results. We failed to reject the null hypothesis. We found that login frequency has no noticeable effect on phishing susceptibility. Our high phishing success rate of 39.3% was likely a leading factor in this result.
Conclusions. This study confirmed prior research showing exceedingly high phishing success rates. We also observed that recruiting only in-person and campus-affiliated users greatly reduced our subject pool, and that the extension-based investigation method, while promising, faces significant challenges itself due to deployed extension-based malware defenses.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Peter Snyder and Michael K. Reiter and Chris Kanich},
title = {The Effect of Repeated Login Prompts on Phishing Susceptibility},
booktitle = {The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016)},
year = {2016},
isbn = {978-1-931971-35-5},
address = {San Jose, CA},
pages = {13--19},
url = {https://www.usenix.org/conference/laser2016/program/presentation/snyder},
publisher = {USENIX Association},
month = may
}
connect with us