You are on page 1of 3

ENG + TECH written by SHINJINI KUNDU

Internet Security
Passwords, Phishing,
and PORTIA
Imagine what it would be The Internet: An Open
like to have an internet site Portal
automatically alter your The internet has been a springboard of the
password every time you log onto a information age. With the advent of online
site. A nightmare? Hardly. This is just one
banking and online shopping, people
of the many new areas of research being
can finish their errands in just a matter of
conducted on internet security at the lab
minutes in a comfy chair at their desks. The
of Dr. Dan Boneh, an associate professor
internet, however, is also an easily accessible
of Computer Science and Electrical
venue for hackers. Thanks to this virtual
Engineering at Stanford. His current
portal, it has now become easier than ever
research may help protect against novel
to devise ways to access the information
forms of information theft that occur on
belonging to others. Internet security
the Internet by helping to develop new
programs exist, but it always seems they are
ways that private online data is transferred
one step behind in the game.
through the internet.
The internet used today is vastly different
Andrew Bortz, a Ph.D. student of Dr.
from the original internet envisioned by
Boneh, explains, “People’s passwords
its creators. Users of the internet today are
could get stolen just by visiting websites.
able to customize web applications as they
Vulnerabilities in the web browser itself
fancy. For example, iGoogle, a customizable
allow the attacker to hijack your computer.”
startpage, includes functions from photo
Internet technology is rapidly changing, but
displaying to playing youtube videos to
the necessary security is still lagging behind.
storing personal to-do lists. Users can access
Attackers are taking advantage.
the functions of multitudes of different

stanford scientific
Credit: sxc.com
websites from simply one convenient web Of course, the email is not really from the
browser, via importable web feeds. financial organization. The fraudulent but
frighteningly well-crafted webpage is
However, hackers also find this convenient. established for the sole purpose of gaining
Hijackers use the low-security websites access to private information. Hamburg
embedded into the iGoogle startpage to explains, “The attacker wants your banking
find out what websites a person has visited password so that he can steal your money.
or personal information and use the person’s He wants your social [security number] so
server to hack other sites with relative that he can take out loans on your credit. He
ease. Besides iGoogle, Facebook, MySpace, wants your credit card so that he can buy
and email applications are other websites stuff with it.”
that can compromise security. According
to Bortz, the security problems are Fortunately, labs such as Professor Dan
compounded when website authorities fail Boneh’s are actively researching better
to take necessary precautions. They either Internet security protocols to thwart
decide to trust the imported web feeds, these hacking strategies. Andrew Bortz, a
or worse, assume a security breach would Ph.D. student under Boneh, describes the
never happen. ongoing research as a “spectrum that ranges
from fixing patches, debugging to more
Most people realize that passwords can be architectural issues.”
stolen through low-security sites. But they
may not know that security problems are Hashing Passwords
not solely confined to low-security websites. Boneh, an Associate Professor of Computer
The web browser itself is vulnerable and Science and Electrical Engineering at
allows attackers to hijack one’s computer. Stanford, is working on internet security as
Passwords may become stolen by visiting part of the project PORTIA. PORTIA, which
any website. Internet users may believe that stands for Privacy, Obligations, and Rights “People’s passwords
a website like facebook is relatively safe, in Technologies of Information Assessment,
but they do not consider the “applications” is designed to look at information security could get stolen just
that can be downloaded onto it or other
websites to which it is linked. Attackers use
in the online world. Boneh and his Stanford
group are working with Yale University and
by visiting websites.
the mediums to access the personal data of
many oblivious users.
a handful of other universities to design the
next generation of technology for handling
Vulnerabilities in the
A classic alternative method to steal
sensitive information and to develop a web browser itself
policy framework for storing and using
passwords is called phishing. Mike Hamburg, online data. allow the attacker to
a Ph.D. student under Dr. Boneh, describes
this as a way to steal information from a PwdHash, short for “password hash,” is one hijack your computer.”
webpage that “looks exactly like the original
but isn’t.” A phishing scam usually begins
of these new technologies that can help
protect sensitive online information. This
– Andrew Bortz
with a spam email that appears to come new application of cryptography is designed
from a legitimate financial organization like to alleviate the problem of people reusing
Bank of America or PayPal. The email directs the same passwords for many different
the recipient to a website that looks like websites.
the financial organization’s homepage. The
unsuspecting recipient is directed to login, A hash function is a function that turns any
using his or her username and password. data into a relatively small integer. Hamburg

volume VII
ENG + TECH

Credit: sxc.com
“We need to a web browser to be more like an
operating system.” – Andrew Bortz

explains, “The feature that PwdHash uses letters and numbers. During World War They must pay a fixed amount every time a
is that cryptographic hashes are one-way.” I and World War II, both sides encrypted user clicks on their ad.
Given the output of the hash, it is almost their electronic messages, which required
impossible to figure out the original code books to translate. By intercepting and Sometimes these search engines also pay
input. PwdHash transforms an individual’s cracking the coded communications during per click to display ads on the websites of
password into a site-specific password. A the Second World War, the British gained small corporations or individuals. In this
user can activate PwdHash by inserting a advantage against the feared German system, abusers can set up a website that
special prefix in front of his or her password submarines known as U-boats. will receive money when a person clicks on
or by pressing a special key like F2. PwdHash an ad posted on that website. By clicking
takes the password and combines it with a Modern encryptions for the internet are the ads repeatedly, they can purposely
site-specific domain name. much more complex than the codes used in charge corporations of unnecessarily large
the first half of the last century. Encryption sums or make small profits for themselves.
For example, if your password for Amazon is tables are often dynamically changed There have even been lawsuits between
“airplane,” PwdHash stores the password as during transmission using multiple hash corporations over such alleged activities.
a string derived from “airplane” and Amazon parameters. Mike Hamburg is currently Andrew Bortz is currently working with
through hashing. Even if someone hacks working to improve some of the glitches Google on making click-fraud defenses more
into another site where you use airplane as a that currently exist in encryptions systems. effective.
password, the attacker will only acquire the
site-specific hashed value of the password Securing the Internet New internet functions call for new security
and not the original password itself. This Internet attackers also take advantage measures. “We need a web browser to be
will prevent the thief from being able to use of loopholes in internet security to more like an operating system,” says Bortz.
the password to log into your account on siphon large sums of money from large This includes tasks ranging from the basics,
Amazon or any other site. corporations. This phenomenon is called like fixing bugs, to much wider architectural
“click-fraud.” Corporations that display ads improvements to enhance network security.
Cryptic Codes on the webpages of large search engines Beware. Secure defenses may soon be
Mike Hamburg is currently working on like Google usually pay on a “per click” basis. brought to a server near you.
encryption, which is another way of
another way of adding internet security.
Encryption is the method by which readily
SHINJINI KUNDU is a staff writer for Stanford Scientific Magazine. She is a freshman at
accessible text is “coded” into seemingly Stanford University and plans to pursue engineering. In addition to science writing, she
indecipherable jibberish. Only the receiver enjoys dancing, debate, and writing sci-fi/fantasy novels.
knows the key to decipher this code.
To Learn More
Encryption is an age old technique of For more information, visit the departmental website of Dr. Dan Boneh, http://crypto.
replacing a word with a different string of stanford.edu/~dabo/

stanford scientific

You might also like