2006 Horizon Awards Winner: Stanford University's Password Hash
A browser plug-in helps customize a user's password for each site, putting a stop to Web spoofing.
In May 2006, nearly 12,000 malicious phishing Web sites were identified by the Anti-Phishing Working Group, a Los Altos, Calif.-based industry association focused on eliminating the scams. That's up from 3,300 sites a year earlier.
Phishing scams trick users into sending their passwords to an unintended Web site -- often unlocking access to bank accounts or other financial data.
|Stanford University Department of Computer Science|
PRODUCT: PwdHash (Password Hash)
DEVELOPERS: Stanford University professor John Mitchell, associate professor Dan Boneh and students Blake Ross, Collin Jackson and Nick Miyake
But some professors and students at Stanford University are taking a big bite out of this crime with Password Hash (PwdHash), a plug-in for popular Web browsers that prevents phishing sites from getting what they want.
"Internet users often use the same password at many Web sites," says Dan Boneh, an associate professor of computer science and electrical engineering at Stanford. "A phishing attack on one site will expose their passwords at many other sites."
By simply adding "@@" to the beginning of a password when registering on a Web site, PwdHash combines the user's password with the site's domain name in an algorithm that customizes a password for the user.
If a password is stolen from a malicious site, it won't work on the authentic site "although you typed in the same password," explains professor John Mitchell, who also led the team.
Although the idea of adding a cryptographic hash function to a password isn't new, Mitchell and his team have advanced the technology by making it easy enough for end users to apply. But the project wasn't always their top priority.
Three years ago, Secret Service agents visited Stanford's engineering and computer science department to seek help in combating financial crimes. "I asked them, 'If we were to solve one problem for you, what would it be?'" Their answer: Web spoofing, now known as phishing.
Stanford University professors Dan Boneh (left) and John Mitchell, developers of Password Hash.
Image Credit: Andy Freeberg
By the summer of 2003, they created SpoofGuard, software that detects fraudulent Web sites. In the process, developers hit on the idea of also modifying the passwords sent out from the user. And so PwdHash was born as a stand-alone piece.
The most difficult part was making PwdHash look easy. Some of the trickiest fake Web pages simply show an image or picture to indicate where to type a password instead of having "enter your password" written in text. "How would our software inside the browser know that the Web page is asking for their password? We had to know which data to apply this cryptographic hash to and which data to leave alone," Mitchell recalls.
That's when doctoral student Collin Jackson came up with the idea of adding the "@@" prefix to every password to tell the software which things are passwords and which aren't.
Today, the software is available for free, with versions for the Internet Explorer and Firefox browsers. Mitchell is trying to persuade major browser vendors to include PwdHash in upcoming releases.
"This type of technology definitely has legs," says David Jevans, chairman of the Anti-Phishing Working Group. "In the U.S., a lot of [Internet security work] is happening on the back end. But that's not going to be enough. The bad guys are always evolving."
Collett is a Computerworld contributing writer. Contact her at email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!