Contributions to Web Authentication for Untrusted Computers
نویسندگان
چکیده
Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas passwordbased authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. Password-based methods are dominant in web authentication since they are both easy to implement and easy to use. Dedicated hardware, on the other hand, is not always available to the user, usually requires additional equipment and may be more complex to use than password-based authentication. Different services and applications on the web have different requirements for the security of authentication. Therefore, it is necessary for designers of authentication solutions to address this need for a range of security levels. Another concern is mobile users authenticating from unknown, and therefore untrusted, computers. This in turn raises issues of availability, since users need secure authentication to be available, regardless of where they authenticate or which computer they use. We propose a method for evaluation and design of web authentication solutions that takes into account a number of often overlooked design factors, i.e. availability, usability and economic aspects. Our proposed method uses the concept of security levels from the Electronic Authentication Guideline, provided by NIST. We focus on the use of handheld devices, especially mobile phones, as a flexible, multipurpose (i.e. non-dedicated) hardware device for web authentication. Mobile phones offer unique advantages for secure authentication, as they are small, flexible and portable, and provide multiple data transfer channels. Phone designs, however, vary and the choice of channels and authentication methods will influence the security level of authentication. It is not trivial to maintain a consistent overview of the strengths and weaknesses of the available alternatives. Our evaluation and design method provides this overview and can help developers and users to compare and choose authentication solutions. This work has been partially supported by ELLIIT. List of Publications Anna Vapen, David Byers and Nahid Shahmehri, “2-clickAuth Optical ChallengeResponse Authentication,” in Fifth International Conference on Availability, Reliability and Security, (ARES '10), Krakow, Poland, 15-18 Feb. 2010, pp.79-86. Anna Vapen and Nahid Shahmehri, “Security Levels for Web Authentication using Mobile Phones,” PrimeLife/IFIP Summer School, 2010 (Published in electronic preproceedings, distributed to summer school participants.) Anna Vapen and Nahid Shahmehri, “Security Levels for Web Authentication using Mobile Phones”, Post-proceedings of PrimeLife/IFIP Summer School, 2010. (Published by Springer 2011.) Anna Vapen and Nahid Shahmehri, “2-clickAuth Optical Challenge-Response Authentication using Mobile Handsets,” International Journal of Mobile Computing and Multimedia Communications (IJMCMC), vol. 3(2), pp. 1-18, April-June 2011.
منابع مشابه
Improving the Security and Robustness of Modern Web Browsers
Despite their popularity, modern web browsers do not offer a secure or robust environment for interacting with untrusted content. Today’s web users face a variety of threats, including exploits of browser vulnerabilities, interference between web sites, script injection attacks, and abuse of authentication credentials. To address these threats, I leverage an analogy between operating systems an...
متن کاملA Secure, Peer-to-Peer File Locker System
We have built a secure, distributed, scalable, peer-to-peer file-locker system which enables users to mirror files of their choice in a decentralized "cloud" of individually untrusted commodity consumer computers, while still ensuring the integrity of replicated files by utilizing keyed-hash message authentication codes. Our system is cross-platform (it can be ported to any device which is capa...
متن کاملLeveraging personal devices for stronger password authentication from untrusted computers
Internet authentication for popular end-user transactions, such as online banking and e-commerce, continuesto be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer(typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related tokeyboard and screen size. However most such transact...
متن کاملStatic Binary Analysis And Transformation For Sandboxing Untrusted Plugins
of the Thesis Static Binary Analysis And Transformation For Sandboxing Untrusted Plugins by Prateek Saxena Master of Science in Computer Science Stony Brook University 2007 Computers today have become a integral part of daily activities for users who rely on them as means of communication, financial management, entertainment, and business. Moreover, users today are depending increasingly on off...
متن کاملThe Untrusted Computer Problem and Camera-Based Authentication
The use of computers in public places is increasingly common in everyday life. In using one of these computers, a user is trusting it to correctly carry out her orders. For many transactions, particularly banking operations, blind trust in a public terminal will not satisfy most users. In this paper the aim is therefore to provide the user with authenticated communication between herself and a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003