How Do Users Chain Email Accounts Together?

Logo poskytovatele

Varování

Publikace nespadá pod Filozofickou fakultu, ale pod Ústav výpočetní techniky. Oficiální stránka publikace je na webu muni.cz.
Autoři

KRAUS Lydia ŠVIDROŇOVÁ Mária STOBERT Elizabeth

Rok publikování 2021
Druh Článek ve sborníku
Konference IFIP International Conference on ICT Systems Security and Privacy Protection
Fakulta / Pracoviště MU

Ústav výpočetní techniky

Citace
www Details about the publication
Doi http://dx.doi.org/10.1007/978-3-030-78120-0_27
Klíčová slova Email recovery; Email forwarding; Fallback authentication; Security; Usability
Přiložené soubory
Popis Recovery connections between email accounts can be exploited in manual hijacking attacks as has been shown in several incidents during the last years. Yet little is known about users’ practices of chaining email accounts together. We conducted a qualitative interview study with 23 students in which they shared their email recovery and forwarding settings with us. Altogether, we collected and analyzed information about 138 different email accounts. We used this data to map email account topologies and analyzed these topologies for recurring patterns. We found that users often make poor configuration decisions in their email recovery setups, and often create patterns in their email recovery topologies that result in security vulnerabilities. Patterns such as loops (seen in more than a quarter of our topologies) could be easily exploited in a targeted attack. We conclude that users need better guidance about how to use email based recovery settings in a robust way.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.