You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures

被引:3
|
作者
Innocenti, Tommaso [1 ]
Mirheidari, Seyed Ali [2 ]
Kharraz, Amin [4 ]
Crispo, Bruno [2 ,3 ]
Kirda, Engin [1 ]
机构
[1] Northeastern Univ, 360 Huntington Ave, Boston, MA 02115 USA
[2] Univ Trento, Via Calepina 14, I-38122 Trento, Italy
[3] Katholieke Univ Leuven, Oude Markt 13, B-3000 Leuven, Belgium
[4] Florida Int Univ, 11200 SW 8th St, Miami, FL 33199 USA
来源
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021 | 2021年 / 12756卷
基金
美国国家科学基金会;
关键词
Web applications; Account recovery; Password resets;
D O I
10.1007/978-3-030-80825-9_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The password recovery process is a critical part of a website's functionality. Many websites that provide online services to their users also need to solve the problem of allowing their users to reset their passwords (e.g., if they have forgotten it). A popular, established technique for allowing a user to recover a lost account is to allow her to send a reset link to her own account via email. Although it might seem easy at a first glance, the security requirements of the password recovery process require web sites to carefully design each step of the process to be resilient even in the presence of an attack. In this paper, we present an in-depth security analysis of the email-based recovery mechanisms of a wide range of web applications. By manually registering accounts and triggering the password recovery process for each website, we were able to study the password reset mechanisms of web sites from three different groups in the Alexa Top 5K (i.e., popular sites, medium popular sites, low popular sites). In this work, we show that the lack of standards in the password recovery process plagues many websites with security weaknesses, and negatively influences the security of the reset process itself. We also show that concrete password-recovery reset attacks can be launched against a high percentage of websites that might even lead to account takeover.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 13 条
  • [1] Attacks and Vulnerability Analysis of E-Mail as a Password Reset Point
    Routh, Caleb
    DeCrescenzo, Brandon
    Roy, Swapnoneel
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [2] You've Got Mail': Accountability and End User Attitudes to Email Management
    Brogan, Mark
    Vreugdenburg, Sue
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON E-GOVERNMENT, 2008, : 63 - 69
  • [3] You’ve got mail: does workplace telepressure relate to email communication?
    Ruben Cambier
    Peter Vlerick
    Cognition, Technology & Work, 2020, 22 : 633 - 640
  • [4] You've got mail: does workplace telepressure relate to email communication?
    Cambier, Ruben
    Vlerick, Peter
    COGNITION TECHNOLOGY & WORK, 2020, 22 (03) : 633 - 640
  • [5] You've Got Mail-to Send, That Is Tips for creating an effective email newsletter
    Rizzuto, Rachel
    DANCE MAGAZINE, 2022, 96 (03): : 68 - 69
  • [6] You've got mail - whether you want it or not: An emic investigation into how email use can be managed
    Lanctot, Andre
    Duxbury, Linda
    COMPUTERS IN HUMAN BEHAVIOR REPORTS, 2025, 18
  • [7] You've got Mail, and Here is What you Could do With It! Analyzing and Predicting Actions on Email Messages
    Di Castro, Dotan
    Karnin, Zohar
    Lewin-Eytan, Liane
    Maarek, Yoelle
    PROCEEDINGS OF THE NINTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'16), 2016, : 307 - 316
  • [9] "You've Got Mail": a Daily Investigation of Email Demands on Job Tension and Work-Family Conflict
    Steffensen, David S., Jr.
    McAllister, Charn P.
    Perrewe, Pamela L.
    Wang, Gang
    Brooks, C. Darren
    JOURNAL OF BUSINESS AND PSYCHOLOGY, 2022, 37 (02) : 325 - 338
  • [10] “You’ve Got Mail”: a Daily Investigation of Email Demands on Job Tension and Work-Family Conflict
    David S. Steffensen
    Charn P. McAllister
    Pamela L. Perrewé
    Gang Wang
    C. Darren Brooks
    Journal of Business and Psychology, 2022, 37 : 325 - 338