Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

[1]  Bruce Schneier,et al.  Two-factor authentication: too little, too late , 2005, CACM.

[2]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[3]  Dan S. Wallach,et al.  Web Spoofing: An Internet Con Game , 1997 .

[4]  Adrian Perrig,et al.  Phoolproof Phishing Prevention , 2006, Financial Cryptography.

[5]  Michael K. Reiter,et al.  Bump in the Ether: A Framework for Securing Sensitive User Input , 2006, USENIX Annual Technical Conference, General Track.

[6]  Yunheung Paek,et al.  Advances in Computer Systems Architecture , 2008 .

[7]  Chanathip Namprempre,et al.  Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.

[8]  Martín Abadi,et al.  Authentication and Delegation with Smart-cards , 1991, TACS.

[9]  Dan Boneh,et al.  Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.

[10]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[11]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[12]  Sean W. Smith,et al.  Trusted paths for browsers , 2002, TSEC.

[13]  Srinivas Devadas,et al.  The untrusted computer problem and camera based authentication using optical character recognition , 2002 .

[14]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[15]  Nalini Venkatasubramanian,et al.  Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[16]  Helen J. Wang,et al.  SubVirt: implementing malware with virtual machines , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[17]  Jason Milletary,et al.  Technical Trends in Phishing Attacks , 1969 .

[18]  Steven D. Gribble,et al.  A Crawler-based Study of Spyware in the Web , 2006, NDSS.

[19]  Edward W. Felten,et al.  Hand-Held Computers Can Be Better Smart Cards , 1999, USENIX Security Symposium.

[20]  Alex Biryukov,et al.  Cryptanalysis of the Alleged SecurID Hash Function , 2003, Selected Areas in Cryptography.

[21]  Dawn Song,et al.  Hash Visualization: a New Technique to improve Real-World Security , 1999 .

[22]  Virgil D. Gligor,et al.  Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes , 2001, FSE.

[23]  Daphna Weinshall,et al.  Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[24]  Robert Biddle,et al.  A Usability Study and Critique of Two Password Managers , 2006, USENIX Security Symposium.

[25]  Simson L. Garfinkel,et al.  Secure Web Authentication with Mobile Phones , 2004 .

[26]  Paul C. van Oorschot,et al.  Message authentication by integrity with public corroboration , 2005, NSPW '05.

[27]  Gernot Heiser Secure Embedded Systems Need Microkernels , 2005, login Usenix Mag..

[28]  Hugo Krawczyk,et al.  Public-key cryptography and password protocols , 1998, CCS '98.

[29]  Diana K. Smetters,et al.  Securing a remote terminal application with a mobile trusted device , 2004, 20th Annual Computer Security Applications Conference.

[30]  Geoffrey G. Xie,et al.  Quantifying effect of network latency and clock drift on time-driven key sequencing , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[31]  Dan Boneh,et al.  Spyware Resistant Web Authentication using Virtual Machines , 2006 .

[32]  Neil Haller,et al.  The S/KEY One-Time Password System , 1995, RFC.

[33]  Volker Roth,et al.  A PIN-entry method resilient against shoulder surfing , 2004, CCS '04.

[34]  Gernot Heiser,et al.  OS Verification - Now! , 2005, HotOS.

[35]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[36]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[37]  Initial Cryptanalysis of the RSA SecurID Algorithm , 2001 .