Mobile devices create new opportunities and challenges for authentication. On one hand, the readily-available sensors provide new opportunities for authentication credentials, such as biometrics and context of the device. On the other hand, mobile applications rely on network services to create rich functionality that often require protection of their sensitive data. The ability for the mobile application developer to adopt a wide range of authentication protocols and techniques is an intractable challenge for adopting new authentication technologies.
In this paper, we propose a flexible framework that enables an out-of-band authentication channel for mobile applications. The framework allows applications to delegate authentication to an independent security service on the client that, in turn, supports an extensible range of authentication protocols. Importantly, the approach presented in this paper does not require any modification of the underlying system, thus not requiring support from the operating system or hardware vendor. Our server-driven approach supports administration and enablement of new authentication techniques and security policies with minimal to no client application modifications. We show the viability of our design by means of a framework prototype and integrating it with a representative authentication system built in-house. We also discuss security and non-security challenges of realizing this approach.
[1]
Li Gong,et al.
User authentication and authorization in the Java/sup TM/ platform
,
1999,
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[2]
Shashi Shekhar,et al.
AdSplit: Separating Smartphone Advertising from Applications
,
2012,
USENIX Security Symposium.
[3]
Roy T. Fielding,et al.
Hypertext Transfer Protocol - HTTP/1.1
,
1997,
RFC.
[4]
Tianhao Tong.
GuarDroid : A Trusted Path for Password Entry
,
2013
.
[5]
Dan S. Wallach,et al.
Longitudinal Analysis of Android Ad Library Permissions
,
2013,
ArXiv.
[6]
Yajin Zhou,et al.
Dissecting Android Malware: Characterization and Evolution
,
2012,
2012 IEEE Symposium on Security and Privacy.
[7]
Jerome H. Saltzer,et al.
The protection of information in computer systems
,
1975,
Proc. IEEE.
[8]
Roy Fielding,et al.
Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation
,
2000
.