Enhancing web browsing security on public terminals using mobile composition

This paper presents an architecture that affords mobile users greater trust and security when browsing the internet (e.g., when making personal/financial transactions) from public terminals at Internet Cafes or other unfamiliar locations. This is achieved by enabling web applications to split their client-side pages across a pair of browsers: one untrusted browser running on a public PC and one trusted browser running on the user's personal mobile device, composed into a single logical interface through a local connection, wired or wireless. Information entered via the personal device's keypad cannot be read by the PC, thwarting PC-based key-loggers. Similarly, information displayed on the personal device's screen is also hidden from the PC, preserving the confidentiality and integrity of security-critical data even in the presence of screen grabbing attacks and compromised PC browsers. We present a security policy model for split-trust web applications that defends against a range of crimeware-based attacks, including those based on active-injection (e.g. inserting malicious packets into the network or spoofing user-input events). Performance results of a prototype split-trust implementation are presented, using a commercially available cell phone as a trusted personal device.

[1]  Edward W. Felten,et al.  Hand-Held Computers Can Be Better Smart Cards , 1999, USENIX Security Symposium.

[2]  Tatu Ylonen,et al.  SSH Transport Layer Protocol , 1996 .

[3]  Dan Boneh,et al.  Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.

[4]  Richard Sharp,et al.  Secure Mobile Computing Via Public Terminals , 2006, Pervasive.

[5]  Brad A. Myers,et al.  Using handhelds and PCs together , 2001, CACM.

[6]  Frank Stajano,et al.  Security policies , 2001, Adv. Comput..

[7]  Simon Josefsson,et al.  The Base16, Base32, and Base64 Data Encodings , 2003, RFC.

[8]  Tomio Kamada Compact HTML for Small Information Appliances , 1998 .

[9]  Roy Want,et al.  The Personal Server: Changing the Way We Think about Ubiquitous Computing , 2002, UbiComp.

[10]  Diana K. Smetters,et al.  Securing a remote terminal application with a mobile trusted device , 2004, 20th Annual Computer Security Applications Conference.

[11]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[12]  Stefan Berger,et al.  Towards Trustworthy Kiosk Computing , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.

[13]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[14]  T. Dierks,et al.  The TLS protocol , 1999 .

[15]  D. Flannanghan JavaScript: The definitive guide , 1999 .

[16]  Michael K. Reiter,et al.  Bump in the Ether: A Framework for Securing Sensitive User Input , 2006, USENIX Annual Technical Conference, General Track.

[17]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[18]  Xiaolan Zhang,et al.  Towards Trustworthy Kiosk Computing , 2007 .

[19]  Pete Chown,et al.  Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.

[20]  Brian King,et al.  Creating Applications with Mozilla , 2002 .

[21]  Claudio S. Pinhanez,et al.  Fostering a Symbiotic Handheld Environment , 2003, Computer.

[22]  David E. Culler,et al.  A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices , 2002, Mob. Networks Appl..