skip to main content
10.1145/1135777.1135853acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

Designing ethical phishing experiments: a study of (ROT13) rOnl query features

Published:23 May 2006Publication History

ABSTRACT

We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an ethical experiment must not expose the participants to any risk; it should be possible to locally verify by the participants or representatives thereof that this was the case. At the same time, an experiment is accurate if it is possible to argue why its success rate is not an upper or lower bound of that of a real attack -- this may be difficult if the ethics considerations make the user perception of the experiment different from the user perception of the attack. We introduce several experimental techniques allowing us to achieve a balance between these two requirements, and demonstrate how to apply these, using a context aware phishing experiment on a popular online auction site which we call "rOnl". Our experiments exhibit a measured average yield of 11% per collection of unique users. This study was authorized by the Human Subjects Committee at Indiana University (Study #05-10306).

References

  1. Mailfrontier phishing IQ test. http://survey.mailfrontier.com/survey/quiztest.html.Google ScholarGoogle Scholar
  2. Know your enemy : Phishing. behind the scenes of phishing attacks. http://www.honeynet.org/papers/phishing/, 2005.Google ScholarGoogle Scholar
  3. Garfinkel, S., and Miller, R. Johnny 2: A user test of key continuity management with S/MIME and Outlook Express. Symposium on Usable Privacy and Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jakobsson, M. Modeling and preventing phishing attacks. In Financial Cryptography (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lester, A. WWW::Mechanize - handy web browsing in a perl object. http://search.cpan.org/ petdance/WWW-Mechanize-1.16/lib/WWW/Mechanize.p%m, 2005.Google ScholarGoogle Scholar
  6. Litan, A. Phishing attack victims likely targets for identity theft. FT-22-8873, Gartner Research (2004).Google ScholarGoogle Scholar
  7. M. Jakobsson, T. Jagatic, S. S. Phishing for clues. www.browser-recon.info.Google ScholarGoogle Scholar
  8. T. Jagatic, N. Johnson, M. J., and Menczer, F. Social phishing. 2006.Google ScholarGoogle Scholar

Index Terms

  1. Designing ethical phishing experiments: a study of (ROT13) rOnl query features

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WWW '06: Proceedings of the 15th international conference on World Wide Web
            May 2006
            1102 pages
            ISBN:1595933239
            DOI:10.1145/1135777

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 23 May 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,899of8,196submissions,23%

            Upcoming Conference

            WWW '24
            The ACM Web Conference 2024
            May 13 - 17, 2024
            Singapore , Singapore

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader