SlideShare a Scribd company logo
1 of 12
Detection of Phishing
by Episodic Image Memory
2-factor authentication schemes, which help servers to detect fake users,
does not help users to detect fake servers.
Our own volitional actions based on correct knowledge are needed.
Episodic image memory helps
Mnemonic Identity Solutions Limited
22 February, 2021
Flow of Operation
This is a cat who used to live with my family 20 years ago.
I have never shared her photo on any SNS. I registered
her as the secret credential for the log-in server. .
The genuine log-in server is supposed to include her picture in a group of
images that are shown to me when I am required to reset my password or
feed my password in extraordinary situations.
I am certain her photo of my emotion-colored episodic memory will jump
into my eye when shown to me even after many years’ of interval.
Now, I am requested to feed my password on
a seemingly authentic log-in server.
If I am guided to a password box straight away,
it is a phishing page.
If I am shown my cat in a group of pictures like
this, however, it does not mean that it is an
authentic server.
These picture might be a copy taken from the
authentic server, on which a phisher might be
trying to lure me to teach them my secret.
My volitional actions based on correct
knowledge are needed.
Now, I select 6 pictures, all of which are
meaningless to me.
If I am led to a password box, I am
watching a phishing server. I will
immediately ask the people in charge to
probe this server.
If am not led to a password box, it does
not necessarily mean that I am talking
with the authentic server.
We could repeat the same process
some more times to increase the level
of certainty.
I now select different pictures, all of
which are again meaningless to me.
If I am led to a password box here, I
am watching a phishing server.
Well, we need to consider the
possibility of a phisher speculating
that I might well teach them my
secret during the first few trials at a
high probability.
.
Critical in this scheme is that users are given
the freedom of choosing the stage at which
they select their secrets; they might select
them at the second or third stage. They might
also opt to repeat many more fake choices.
Here, I select yet different meaningless
pictures.
If I am shown a password box here, I need to
do the needful to get the phishing server
taken down.
Phishers, who are aware that they have
to predetermine at which stage they lure
the users to their fake log-in page, must
know they have only one chance for it.
The phishers are supposedly conscious
that their phishing server could be
probed immediately after the first
mismatch.
Here, I opt to make a fake choice again.
Another fake choice.
Now, I include my cat in this choice, although
I could opt to do so after several more fake
choices.
If I am not led to the password box here, it
tells that I have been talking with a phishing
server. I will do the needful.
If I am led to the password box, I judge that
this is the authentic log-in sever at a
reasonably high probability.
Users, who want to have a yet higher
certainty, may opt to spend a few more
minutes with another image of their hard-to-
forget episodic image memory.
Not for Low-Value Account
Very bothersome for users?
Yes, it takes as long as minutes instead of seconds.
This scheme is suggested for the passwords of high-
value accounts that justify spending an extra few
minutes for infrequent but critical occasions.
What Else?
Phishing is so hard to tackle. It would be no surprise if people look to the power of
2-Factor Authentication. But…
Phishers do not have to bother to judge whether a presented token is a certified
one or not, but could simply pretend to have judged it as correct before demanding
our passwords. The phished password could be abused elsewhere.
It is the phishers that control the screen shown to us. With this knowledge, we
might be able to hold our password; present a wrong token and see how the log-in
page behaves; if it is accepted, we are watching a phishing page. People who do not
have this knowledge could easily fall victim to phishers, possibly unknowingly.
Our own volitional actions based on correct knowledge are needed. In view of the
nature of phishing, we find no other ways.
More Tweaks
Whatever belongs to “our own volitional actions based on correct knowledge”
could work as an additional component; for instance, a world map on which we
register and locate a certain place where we had personally experienced an
unforgettable event that we still remember vividly after many years.
Needless to say, when we build a server-based Expanded Password System, we will
have it incorporate this defense layer of phishing detection.

More Related Content

More from Hitoshi Kokumai

Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018Hitoshi Kokumai
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Hitoshi Kokumai
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryHitoshi Kokumai
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BHitoshi Kokumai
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...Hitoshi Kokumai
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHitoshi Kokumai
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password SystemHitoshi Kokumai
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 

More from Hitoshi Kokumai (8)

Updated: Presentation with Scripts at CIW2018
Updated:  Presentation with Scripts at CIW2018Updated:  Presentation with Scripts at CIW2018
Updated: Presentation with Scripts at CIW2018
 
Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018Presentation with Scripts at CIWEU2018
Presentation with Scripts at CIWEU2018
 
Updated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and MemoryUpdated: Identity Assurance by Our Own Volition and Memory
Updated: Identity Assurance by Our Own Volition and Memory
 
Deployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63BDeployment of Biometrics & Password - NIST63B
Deployment of Biometrics & Password - NIST63B
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Help unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guidelineHelp unravel the conundrum over NIST authentication guideline
Help unravel the conundrum over NIST authentication guideline
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Detection of Phishing by Episodic Image Memory

  • 1. Detection of Phishing by Episodic Image Memory 2-factor authentication schemes, which help servers to detect fake users, does not help users to detect fake servers. Our own volitional actions based on correct knowledge are needed. Episodic image memory helps Mnemonic Identity Solutions Limited 22 February, 2021
  • 2. Flow of Operation This is a cat who used to live with my family 20 years ago. I have never shared her photo on any SNS. I registered her as the secret credential for the log-in server. . The genuine log-in server is supposed to include her picture in a group of images that are shown to me when I am required to reset my password or feed my password in extraordinary situations. I am certain her photo of my emotion-colored episodic memory will jump into my eye when shown to me even after many years’ of interval.
  • 3. Now, I am requested to feed my password on a seemingly authentic log-in server. If I am guided to a password box straight away, it is a phishing page. If I am shown my cat in a group of pictures like this, however, it does not mean that it is an authentic server. These picture might be a copy taken from the authentic server, on which a phisher might be trying to lure me to teach them my secret. My volitional actions based on correct knowledge are needed.
  • 4. Now, I select 6 pictures, all of which are meaningless to me. If I am led to a password box, I am watching a phishing server. I will immediately ask the people in charge to probe this server. If am not led to a password box, it does not necessarily mean that I am talking with the authentic server. We could repeat the same process some more times to increase the level of certainty.
  • 5. I now select different pictures, all of which are again meaningless to me. If I am led to a password box here, I am watching a phishing server. Well, we need to consider the possibility of a phisher speculating that I might well teach them my secret during the first few trials at a high probability. .
  • 6. Critical in this scheme is that users are given the freedom of choosing the stage at which they select their secrets; they might select them at the second or third stage. They might also opt to repeat many more fake choices. Here, I select yet different meaningless pictures. If I am shown a password box here, I need to do the needful to get the phishing server taken down.
  • 7. Phishers, who are aware that they have to predetermine at which stage they lure the users to their fake log-in page, must know they have only one chance for it. The phishers are supposedly conscious that their phishing server could be probed immediately after the first mismatch. Here, I opt to make a fake choice again.
  • 9. Now, I include my cat in this choice, although I could opt to do so after several more fake choices. If I am not led to the password box here, it tells that I have been talking with a phishing server. I will do the needful. If I am led to the password box, I judge that this is the authentic log-in sever at a reasonably high probability. Users, who want to have a yet higher certainty, may opt to spend a few more minutes with another image of their hard-to- forget episodic image memory.
  • 10. Not for Low-Value Account Very bothersome for users? Yes, it takes as long as minutes instead of seconds. This scheme is suggested for the passwords of high- value accounts that justify spending an extra few minutes for infrequent but critical occasions.
  • 11. What Else? Phishing is so hard to tackle. It would be no surprise if people look to the power of 2-Factor Authentication. But… Phishers do not have to bother to judge whether a presented token is a certified one or not, but could simply pretend to have judged it as correct before demanding our passwords. The phished password could be abused elsewhere. It is the phishers that control the screen shown to us. With this knowledge, we might be able to hold our password; present a wrong token and see how the log-in page behaves; if it is accepted, we are watching a phishing page. People who do not have this knowledge could easily fall victim to phishers, possibly unknowingly. Our own volitional actions based on correct knowledge are needed. In view of the nature of phishing, we find no other ways.
  • 12. More Tweaks Whatever belongs to “our own volitional actions based on correct knowledge” could work as an additional component; for instance, a world map on which we register and locate a certain place where we had personally experienced an unforgettable event that we still remember vividly after many years. Needless to say, when we build a server-based Expanded Password System, we will have it incorporate this defense layer of phishing detection.