November 14, 2006
We've been actively working to test the effectiveness of the Phishing Protection feature in Firefox 2 as part of Mozilla's ongoing commitment to security. As an addition to Mozilla's community development and testing process, we initiated a program to test the effectiveness of this feature in an open, transparent and unbiased way. We're doing this to better understand how well Phishing Protection performs in flagging potential phishing attacks in general and relative to Microsoft's phishing filter in Internet Explorer 7. More information will allow us, as a community, to make good product decisions. This document outlines the basic testing methodology we used and the final test results.
This is just the beginning of a community-based project to actively monitor and test the effectiveness of our security measures. We're going to do even more, and we're actively recruiting people from the community to help. At the end of the day, our goal is to help make the Web safer for everyone. Please join the discussion atlists.mozilla.org.
The scope of this test was to measure how well anti-phishing features in Firefox 2 and Internet Explorer 7 identified a set of known phishing sites. Because we test for false positives through other mechanisms, false positive testing was out of scope for this initiative. Thus, the data source used for this test included only known phishing URLs.
Test phishing URLs were received fromPhishTank via their publicXML feed of valid phishing URLs. PhishTank is a community-driven web service that allows for phishing URLs to be submitted and verified by hundreds of community participants. The PhishTank XML feed consisted of URLs verified by the PhishTank community as valid phishing URLs. The feed was downloaded once per hour, and any new phishing URLs found were added to a testing database.
Firefox 2 (RC3 and final release) and IE 7 (final release) were tested in this round, all using Windows XP machines. Additionally, two modes per browser were tested:
An independent, third party software services and testing company,SmartWare, was selected to perform the tests to ensure that testing was conducted in manner that was fair and unbiased. SmartWare testing extended over a period of two weeks, from 10/19/2006 to 11/06/2006.
A simple web application was developed that allowed SmartWare testers to interface with the testing database, which served as the repository for the phishing URLs and test results. The testing application displayed a list of no more than seven test records at a time. Each record in the list linked to a reporting page that contained the phishing URL to be tested, and edit fields to report the results for each browser mode. One phishing URL was provided per test record.
Testers worked in teams of two, and would rotate testing from one browser to the next. Testers had to report results on all four browser modes before a test record was considered complete. Once this occurred, the completed test record dropped off the list and a new test record was added. Limiting the available test records to seven at a time ensured that all four modes were tested per URL in as short of a time window as possible.
Since time favors the second browser tested (it gives the phishing features more time to update their lists), the testing order between Firefox 2 and IE 7 was rotated to ensure that no one browser had a testing advantage over another. It should be noted that Firefox was tested first more times than IE 7 to discourage unfair advantages for Firefox.
The available reporting fields were as follows:
Each report was time stamped so that any results that exceeded a time limit could be disqualified.
Testers were instructed to report results only for URLs that were actively spoofing a legitimate site. Sites with 404 messages, server not found messages, or messages from an ISP stating that a site had been removed were tagged "site offline," and are not counted in the final results.
Once the test run was complete, test results were filtered to disqualify some records from the final results. The filters were as follows:
Our testing metholodogy and results were audited byiSEC Partners to ensure the integrity of our findings. The results of the iSEC Partners audit are availablehere.
| Mode | Sites Blocked | % Blocked |
| Firefox 2 Local List | 820 | 78.85% |
| Firefox 2 Ask Google | 848 | 81.54% |
| IE7 Auto Check OFF | 16 | 1.54% |
| IE7 Auto Check ON | 690 | 66.35% |
Mozilla would like to acknowledge all of the hard work that everyone put into the Phishing Protection feature to make it such a great success.Google, for plugging their anti-phishing services into, and for contributing to, the Phishing Protection framework.PhishTank and the PhishTank community for their responsiveness and help in providing us with validated phishing data.SmartWare, for diligently running through such a large number of tests. AndiSEC Partners, for auditing and reporting on our test methodology and results.

Portions of this content are ©1998–2014 by individual mozilla.org contributors. Content available under a Creative Commonslicense.