Protecting applications with transient authentication

How does a machine know who is using it? Current systems authenticate their users infrequently, and assume the user's identity does not change. Such persistent authentication is inappropriate for mobile and ubiquitous systems, where associations between people and devices are fluid and unpredictable. We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link. We present the four principles underlying Transient Authentication, and describe two techniques for securing applications. Applications can be protected transparently by encrypting in-memory state when the user departs and decrypting this state when the user returns. This technique is effective, requiring just under 10 seconds to protect and restore an entire machine, but indiscriminate. Instead, applications can utilize an API for Transient Authentication, protecting only sensitive state. We describe our ports of three applications---PGP, SSH, and Mozilla---to this API. Mozilla, the most complicated application we have ported, suffers less than 4% overhead in page loads in the worst case, and in typical use can be protected in less than 250 milliseconds.

[1]  Bennet S. Yee,et al.  Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.

[2]  Abraham Silberschatz,et al.  Operating System Concepts , 1983 .

[3]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[4]  P. L. Venetianer,et al.  An Iris Biometric System for Public and Personal Use , 2000, Computer.

[5]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[6]  Abraham Silberschatz,et al.  Operating Systems Concepts , 2005 .

[7]  Brian D. Noble,et al.  The case for transient authentication , 2002, EW 10.

[8]  Niels Provos,et al.  Encrypting Virtual Memory , 2000, USENIX Security Symposium.

[9]  Crispan Cowan,et al.  StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.

[10]  Chatschik Bisdikian,et al.  Bluetooth Revealed , 2000 .

[11]  Matt Blaze,et al.  Key Management in an Encrypting File System , 1994, USENIX Summer.

[12]  Peter Gutmann,et al.  Secure deletion of data from magnetic and solid-state memory , 1996 .

[13]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[14]  Peter Honeyman,et al.  Long Running Jobs in an Authenticated Environment , 1993, USENIX Security Symposium.

[15]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[16]  Brian D. Noble,et al.  Zero-interaction authentication , 2002, MobiCom '02.

[17]  Andrew C. Myers,et al.  Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[18]  William A. Arbaugh,et al.  Personal Secure Booting , 2001, ACISP.

[19]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[20]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[21]  Mandayam T. Raghunath,et al.  Application design for a smart watch with a high resolution display , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.

[22]  Peter Honeyman,et al.  Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.

[23]  P. Jonathon Phillips,et al.  An Introduction to Evaluating Biometric Systems , 2000, Computer.

[24]  Tatu Ylonen,et al.  SSH: secure login connections over the internet , 1996 .

[25]  William Stallings,et al.  PGP Message Exchange Formats , 1996, RFC.

[26]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[27]  Markus Jakobsson,et al.  How to Forget a Secret , 1999, STACS.

[28]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[29]  Alan O. Freier,et al.  SSL Protocol Version 3.0 Internet Draft , 1996 .

[30]  Carl E. Landwehr,et al.  Protecting unattended computers without software , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[31]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[32]  Richard J. Lipton,et al.  A Revocable Backup System , 1996, USENIX Security Symposium.

[33]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.