Measurements, Attacks, and Defenses for the Web (MADWeb) Workshop 2021

All times are in PST (UTC-8).

Thursday February 25
  • 7:30 am - 8:00 am
    Welcome and Introductory Remarks
  • 8:00 am - 9:00 am
    Invited talk 1
    • Abstract

      Over the past decade, HTTPS adoption has risen dramatically. The Web PKI has shifted seismically, with browsers imposing new requirements on CAs and server operators. These shifts bring security and privacy improvements for end users, but they have often been driven by incompatible browser changes that break websites, causing frustration for end users as well as server operators. Security-positive breaking changes involve a plethora of choices. Should browsers roll out a change gradually, or rip the band-aid off and deploy it all at once? How do we advertise the change and motivate different players in the ecosystem to update configurations before they break? How do different types and amounts of breakage affect the user experience? And the meta-question: how do we approach such quandaries scientifically? Drawing from several case studies in the HTTPS ecosystem, I'll talk about the science of nudging an ecosystem: methods that the web browser community has developed, and lessons we've learned, for measuring how best to get millions of websites to improve security while minimizing the frustrations of incompatibility.

    9:00 am - 10:30 am
    Session 1: Tales of Browser Security
    10:30 am - 12:00 pm
    Session 2: To the Network Level and Beyond
  • 12:00 pm - 12:30 pm
  • 12:30 pm - 1:30 pm
    Invited talk 2
    • Abstract

      Since the dawn of the web miscreants have used this new communication medium to defraud unsuspecting users. The most common of these attacks is phishing: creating a fake login form to steal username/passwords for high-value targets such as email, social networking, or financial services. This seemingly low-skill attack still, to this day, is responsible for vast amounts of fraud and harm.

      In this talk, I will cover the history of the cat-and-mouse game of phishing, touching on why, after more than a decade of research, phishing attacks are still the most common ways that end-users are directly victimized and attacked. We will discuss the advanced nature of server-side cloaking employed by phishers, as well as the PhishFarm framework which allows us to empirically measure the effect of cloaking techniques on browser-based blocking. Then, we will discuss the first end-to-end measurement of a phishing timeline: from a phishing website being deployed to credentials being used fraudulently. Finally, we'll discuss how phishers have adapted to the COVID-19 pandemic and the next generation of sophisticated phishing attacks.

    1:30 pm - 3:00 pm
    Session 3: The New Attacks
  • 3:00 pm - 3:30 pm
    Concluding Remarks and Best Paper Award