Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems 2021
DOI: 10.1145/3411764.3445574
|View full text |Cite
|
Sign up to set email alerts
|

I Don’t Need an Expert! Making URL Phishing Features Human Comprehensible

Abstract: Judging the safety of a URL is something that even security experts struggle to do accurately without additional information. In this work, we aim to make experts' tools accessible to non-experts and assist general users in judging the safety of URLs by providing them with a usable report based on the information professionals use. We designed the report by iterating with 8 focus groups made up of end users, HCI experts, and security experts to ensure that the report was usable as well as accurately interprete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 58 publications
0
6
0
Order By: Relevance
“…Participants spent little time viewing security indicators when assessing websites, instead using similar strategies to those found in prior work [19], [18], such as close inspection of web-page content or paying attention to the URL, despite misunderstandings regarding syntax such as differences between domains and sub-domains. These results hold when we also consider that many end-users struggle to understand the syntax and function of URLs [2], [5], [53]. More recently, Zheng and Becker [70] conducted a study to investigate the impact of presenting email headers to end-users had on their ability to identify legitimate phishing examples.…”
Section: A Users Identifying Phishmentioning
confidence: 68%
“…Participants spent little time viewing security indicators when assessing websites, instead using similar strategies to those found in prior work [19], [18], such as close inspection of web-page content or paying attention to the URL, despite misunderstandings regarding syntax such as differences between domains and sub-domains. These results hold when we also consider that many end-users struggle to understand the syntax and function of URLs [2], [5], [53]. More recently, Zheng and Becker [70] conducted a study to investigate the impact of presenting email headers to end-users had on their ability to identify legitimate phishing examples.…”
Section: A Users Identifying Phishmentioning
confidence: 68%
“…We instead seek to identify and characterize clusters of seemingly unique and disassociated URLs as a motivated whole and thus, gain more pertinent insights into such concerted attacks. This is exemplified in one of our key findings: Google Safe Browsing 1 , the default block-list used in most web-browsers, is not able to detect all unique URLs for 49.76% of 18,360 multi-URL malicious campaigns we discovered. Considering the expectation that malware is often unleashed in waves, this indicates that a more refined approach is warranted.…”
Section: Introductionmentioning
confidence: 84%
“…Regardless of their intent, malicious actors have relied on the humble Uniform Resource Locator (URL) as the penultimate step in their pernicious operations. Littered throughout phishing emails, social network spam, and suspicious web-sites, these otherwise common text strings are crafted to mislead end-users [1,2]. This results in the divulging of sensitive personal and/or commercial information via fake login pages [3], or the inadvertent download of malware which compromise machines and allow unauthorized access [4].…”
Section: Introductionmentioning
confidence: 99%
“…Recent work shifts the focus from automated phishing detection to detection support to assist users in making their own judgements [3], since automated approaches are not always 100% accurate and real-time support such as warnings can effectively change risky behaviors. Presenting users with security indicators' information enables human strength in capturing abnormal behaviors, such as contextual awareness.A human-centric solution using autonomous ML agents to aid judgment can therefore be a crucial step in the right direction.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the existing works on phishing detection support heavily rely on the legitimacy of URLs [2,3]. However, explanations of URL features are easy to understand by general users, e.g., website rank, hostname, and domain popularity.…”
Section: Introductionmentioning
confidence: 99%