Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rachna Dhamija is active.

Publication


Featured researches published by Rachna Dhamija.


human factors in computing systems | 2006

Why phishing works

Rachna Dhamija; J. D. Tygar; Marti A. Hearst

To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users. We first analyzed a large set of captured phishing attacks and developed a set of hypotheses about why these strategies might work. We then assessed these hypotheses with a usability study in which 22 participants were shown 20 web sites and asked to determine which ones were fraudulent. We found that 23% of the participants did not look at browser-based cues such as the address bar, status bar and the security indicators, leading to incorrect choices 40% of the time. We also found that some visual deception attacks can fool even the most sophisticated users. These results illustrate that standard security indicators are not effective for a substantial fraction of users, and suggest that alternative approaches are needed.


ieee symposium on information visualization | 2001

Animated exploration of dynamic graphs with radial layout

Ka-Ping Yee; Danyel Fisher; Rachna Dhamija; Marti A. Hearst

We describe a new animation technique for supporting interactive exploration of a graph. We use the well-known radial tree layout method, in which the view is determined by the selection of a focus node. Our main contribution is a method for animating the transition to a new layout when a new focus node is selected. In order to keep the transition easy to follow, the animation linearly interpolates the polar coordinates of the nodes, while enforcing ordering and orientation constraints. We apply this technique to visualizations of social networks and of the Gnutella file-sharing network, and discuss the results from our informal usability tests.


ieee symposium on security and privacy | 2008

The Seven Flaws of Identity Management: Usability and Security Challenges

Rachna Dhamija; Lisa Dusseault

Web identity management systems are complex systems with powerful features - and many potential vulnerabilities. They aim to facilitate the management of identifiers, credentials, personal information, and the presentation of this information to other parties. In many schemes, an identity provider (IdP) issues identities or credentials to users, while a relying party (RP) depends on the IdP to check the user credentials before it allows users access to Web site services. By separating the role of and IdP from the RP, identity management systems let users leverage one identifier across multiple Web services.


Lecture Notes in Computer Science | 2005

Phish and HIPs: human interactive proofs to detect phishing attacks

Rachna Dhamija; J. D. Tygar

In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer issues a challenge to the user over a network, in this case, the user issues a challenge to the computer. This type of HIP can be used to detect phishing attacks, in which websites are spoofed in order to trick users into revealing private information. We define five properties of an ideal HIP to detect phishing attacks. Using these properties, we evaluate existing and proposed anti-phishing schemes to discover their benefits and weaknesses. We review a new anti-phishing proposal, Dynamic Security Skins (DSS), and show that it meets the HIP criteria. Our goal is to allow a remote server to prove its identity in a way that is easy for a human user to verify and hard for an attacker to spoof. In our scheme, the web server presents its proof in the form of an image that is unique for each user and each transaction. To authenticate the server, the user can visually verify that the image presented by the server matches a reference image presented by the browser.


human factors in computing systems | 2000

Hash visualization in user authentication

Rachna Dhamija

Although research in security has made tremendous progress over the past few years, most security systems still suffer by failing to account for human factors. People are slow and unreliable at processing long and meaningless strings, yet many security applications depend on this skill. For example, a major problem in user authentication is that people have difficulties in choosing and memorizing secure passwords. In this paper, we have investigated how the usability and security of user authentication systems can be improved by replacing text strings with structured images.


financial cryptography | 2007

Erratum to: Financial Cryptography and Data Security

Sven Dietrich; Rachna Dhamija

Erratum to: S. Dietrich and R. Dhamija (Eds.) Financial Cryptography and Data Security DOI: 10.1007/978-3-540-77366-5


usenix security symposium | 2000

Déjà Vu: a user study using images for authentication

Rachna Dhamija; Adrian Perrig


symposium on usable privacy and security | 2005

The battle against phishing: Dynamic Security Skins

Rachna Dhamija; J. D. Tygar


ieee symposium on security and privacy | 2007

The Emperor's New Security Indicators

Stuart E. Schechter; Rachna Dhamija; Andy Ozment; Ian Fischer


Archive | 2007

The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies †

Stuart E. Schechter; Rachna Dhamija; Andy Ozment; Ian Fischer

Collaboration


Dive into the Rachna Dhamija's collaboration.

Top Co-Authors

Avatar

J. D. Tygar

University of California

View shared research outputs
Top Co-Authors

Avatar

Andy Ozment

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Stuart E. Schechter

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sven Dietrich

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eiji Hayashi

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge