authentication with a hardware token and use of various
click-based keyboards to avoid key loggers. In some cases
banks may ask the user to authenticate each transaction
with a hardware token. Although some of these techniques
definitely improve security, they can place a heavy
burden on the end user.
Another usability feature of the Web browser that malware
has attacked is the auto-complete function. Autocomplete
saves the form information in a safe location
and presents the user with options for what was typed
before into a similar form. Several families of malware,
such as the Goldun/Trojan Hearse, used this technique
very effectively. The malware cracked the encrypted autocomplete
data from the browser and sent it back to the
central server location without even having to wait for
the user to log in to the site.
Given all the vulnerabilities out there and the willingness
of attackers to exploit them, you might think that
users would be clamoring for more security from their
browsers. And some of them do—as long as it doesn’t
prevent any of their desired features from working.
Let’s start with the browser software itself. From a
security engineering perspective, the obvious choice
for browser software (or any software) is to ship it in a
locked-down state, with all security features turned on.
Then the user or enterprise may choose to weaken the
security by enabling functions that they want. Consumer
software that has done this has generally failed in the
marketplace. Consumers want security, but they don’t
want to think about it or configure it. If the shipped configuration
does what they want, they probably will not
alter the configuration much, if at all.
Therefore, the browser designer faces the Goldilocks
problem. Either the porridge is too cold (not usable
because of the demands of the security lockdown) or too
hot (too easy to abuse because not enough security measures
are in place, or are too weak). Designing a configuration
that is “just right” is nearly impossible because
of evolving threats, uncovered bugs, and differing user
tolerances for frustration.