back channels can be useful! – layering authentication channels to provide covert communication

22
Layering Authentication to Provide Covert Channel Communication Authors: M. Almeshekah, M. Atallah and E. Spafford The 21st International Workshop in Security Protocols March 20th, 2013

Upload: mohammed-almeshekah

Post on 18-Jan-2017

84 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

Layering Authentication to Provide Covert Channel Communication

Authors: M. Almeshekah, M. Atallah and E. Spafford

The 21st International Workshop in Security Protocols

March 20th, 2013

Page 2: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Motivation

Page 3: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Motivation

Banks traditionally provide “all-or-nothing” access.

Ideally in this situation we want at least three levels (view-only, transactions, administrative).

Page 4: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Motivation

Banks traditionally provide “all-or-nothing” access.

Ideally in this situation we want at least three levels (view-only, transactions, administrative).

It’s a good idea!

Why is it not provided?

Page 5: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Preliminary Solution

Page 6: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Preliminary SolutionBased on password-based authentication.

Goals:

Same interfaces.

Simple for users to remember.

Alleviate the damage of password compromise.

Page 7: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Preliminary SolutionBased on password-based authentication.

Goals:

Same interfaces.

Simple for users to remember.

Alleviate the damage of password compromise.

The user needs to choose three regular words.

No randomness requirement!

Page 8: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Preliminary Solution - 2User enters her normal username and password.

Following the password the user enters a space and one of the words, depending on what message she wants to convey.

Username :

Password :Alice

pass<sp>wi

Page 9: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Conveying Different Messages

Page 10: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Conveying Different MessagesConveying duress or coercion:

Choosing one of these words from a defined dictionary.

Page 11: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Conveying Different MessagesConveying duress or coercion:

Choosing one of these words from a defined dictionary.

Exposing Phishing:

Communicating the user’s state covertly (solicited vs. unsolicited) and indirectly alerting the server.

Alleviate the damage incurred as a result of falling for a phishing attack.

A more sophisticated system with 3rd party monitoring the user’s login requests.

Page 12: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Conveying Different MessagesConveying duress or coercion:

Choosing one of these words from a defined dictionary.

Exposing Phishing:

Communicating the user’s state covertly (solicited vs. unsolicited) and indirectly alerting the server.

Alleviate the damage incurred as a result of falling for a phishing attack.

A more sophisticated system with 3rd party monitoring the user’s login requests.

Credentials Sharing.

Page 13: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Beyond Passwords

Page 14: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Beyond Passwords

Biometrics - e.g., the choice of which finger to use, the angle, and the pressure can be used to express some information.

Page 15: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Beyond Passwords

Biometrics - e.g., the choice of which finger to use, the angle, and the pressure can be used to express some information.

Multi-factor authentication:

Two-factor and active man-in-the-middle attacks.

The multiplicity of factors provides a new communication channel.

Page 16: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Desiderata for a Better System

Page 17: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Desiderata for a Better System

Obliviousness - Covert messages and replay protection.

Page 18: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Desiderata for a Better System

Obliviousness - Covert messages and replay protection.

Resistance to Server Compromise:

Not taxing user memory vs. vulnerability against dictionary-like attacks.

Page 19: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Desiderata for a Better System

Obliviousness - Covert messages and replay protection.

Resistance to Server Compromise:

Not taxing user memory vs. vulnerability against dictionary-like attacks.

Resistance to Persistent Adversaries.

Page 20: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Further Remarks

Page 21: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

21st SPW Layering Authentication to Provide Covert Communication March 19-20, 2013

Further Remarks

The grand vision of authentication.

Authentication information stored at the servers.

Psychological factors.

Risk analysis and economics.

Page 22: Back Channels Can be Useful! – Layering Authentication Channels to Provide Covert Communication

Questions?Mikhail Atallah

[email protected] Almeshekah [email protected]

@meshekah

Eugene H. Spafford [email protected]

@theRealSpaf