< Guess Who ? Large -Scale Data-Centric Study of the Adequacy of - - PowerPoint PPT Presentation

guess who large scale data centric study of the adequacy
SMART_READER_LITE
LIVE PREVIEW

< Guess Who ? Large -Scale Data-Centric Study of the Adequacy of - - PowerPoint PPT Presentation

< Guess Who ? Large -Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication> IMIS 2020, July 1, 2020 Nampoina Andriamilanto, Tristan Allard, Gatan Le Guelvouit Web Authentication Passwords


slide-1
SLIDE 1

<“Guess Who?” Large-Scale Data-Centric Study of the Adequacy

  • f Browser Fingerprints for Web Authentication>

IMIS 2020, July 1, 2020

Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit

slide-2
SLIDE 2

Public distribution 2

Web Authentication

◆ Passwords suffer from flaws

– Dictionary attacks: common passwords [5] or reuse [14] – Phishing attacks: 12.4 million stolen credentials [12]

◆ Leading to multi-factor authentication

slide-3
SLIDE 3

Public distribution 3

Web Authentication by Browser Fingerprinting

◆ Browser fingerprinting

– Collection of browser attributes – Depending on the web environment

◆ Use for web authentication

http://example.com
slide-4
SLIDE 4

Public distribution 4

Motivation

◆ No large-scale study on browser fingerprints for authentication

– Large fingerprint set, fewer than 30 attributes [4, 11, 15] – More than 30 attributes, less than 2,000 users [8, 17]

◆ Previous works focus on

– Authentication mechanism designs [6, 10, 16] – Efficacy for web tracking [4, 11, 13, 15, 17]

◆ Existing tools lack documentation

– Examples are MicroFocus1 or SecureAuth2

1 - https://www.netiq.com/documentation/access-manager-44/admin/data/how-df-works.html 2 - https://docs.secureauth.com/pages/viewpage.action?pageId=33063454

slide-5
SLIDE 5

Institute of Research and Technology b-com.com

Public distribution 5

Authentication Factor Properties

slide-6
SLIDE 6

Public distribution 6

Similarity with Biometric Factors

◆ Similarity with biometric factors

– Extraction of features from an entity – Recognition of the entity – Imperfections due to digitalization

◆ Properties identified by previous works [1, 2, 3]

slide-7
SLIDE 7

Public distribution 7

Authentication Factor Properties

◆ Properties to be usable

– Universality – Distinctiveness – Stability – Collectibility

◆ Properties to be practical

– Performance – Acceptability – Circumvention

slide-8
SLIDE 8

Public distribution 8

Authentication Factor Properties

◆ Properties to be usable

– Universality – Distinctiveness – Stability – Collectibility

◆ Properties to be practical

– Performance – Acceptability3 – Circumvention [16]

3 - https://support.google.com/accounts/answer/1144110

slide-9
SLIDE 9

Public distribution 9

Notation

◆ Fingerprint domain 𝑮

– Considering 𝑜 attributes, with 𝑊

𝑦 the domain of the attribute 𝑦

𝐺 = 𝑤1, … , 𝑤𝑜 𝑤𝑦 ∈ 𝑊

𝑦 }

◆ Fingerprint dataset 𝑬

– Fingerprint 𝑔 was collected from the browser 𝑐 at the moment 𝑢 – With 𝐶 the browser population, and 𝑈 the time domain

𝐸 = 𝑔, 𝑐, 𝑢 𝑔 ∈ 𝐺, 𝑐 ∈ 𝐶, 𝑢 ∈ 𝑈 }

slide-10
SLIDE 10

Public distribution 10

Dinstictiveness

◆ Dinstictiveness: are two different browsers distinguishable?

– 𝐶(𝑔, 𝐸): the browsers sharing the fingerprint 𝑔 in the dataset 𝐸

◆ Size of the anonimity sets

– 𝐵(𝑡, 𝐸): the fingerprints in an anonymity set of size 𝑡

𝐶 𝑔, 𝐸 = 𝑐 ∈ 𝐶 𝑕, 𝑐, 𝑢 ∈ 𝐸, 𝑔 = 𝑕 } 𝐵 𝑡, 𝐸 = 𝑔 ∈ 𝐺 𝑑𝑏𝑠𝑒 𝐶 𝑔, 𝐸 = 𝑡 }

slide-11
SLIDE 11

Public distribution 11

Stability

◆ Stability: can a browser be recognized through time? ◆ Example of consecutive fingerprints

– Fingerprints: { 𝑔

1, 𝑐, 𝑢1 , 𝑔 2, 𝑐, 𝑢2 , 𝑔 3, 𝑐, 𝑢3 }

– Consecutive fingerprints: { 𝑔

1, 𝑔 2 , 𝑔 2, 𝑔 3 }

◆ Stability measure

– Grouped by the elapsed time – Similarity: proportion of identical attributes

slide-12
SLIDE 12

Public distribution 12

Performance

◆ Collection time

– Over the JavaScript attributes

◆ Size

– Only the canvases are hashed

◆ Loss of efficacy

– Through time: over the six months [9] – Through space: over the device types [7, 11]

slide-13
SLIDE 13

Institute of Research and Technology b-com.com

Public distribution 13

Results

slide-14
SLIDE 14

Public distribution 14

◆ Fingerprint collection experiment

– Probe on two web pages – Industrial partner (top 15 French websites4)

Large-scale Fingerprint Dataset

Panopticlick [4] AmIUnique [11] Hiding in the Crowd [13] Long-Term Observation [17] This study Collection period 3 weeks 3-4 months 6 months 3 years 6 months Attributes 8 17 17 305 262 Fingerprints 470,161 118,934 2,067,942 88,088 4,145,408 Browsers

  • 1,989,365

Unicity 0.836 0.894 0.336 0.954–0.958 0.818

4 - https://www.alexa.com/topsites/countries/FR

slide-15
SLIDE 15

Public distribution 15

◆ >80% of the

fingerprints are unique

◆ >94% are shared

by ≤8 browsers

Fingerprints Distinctiveness

slide-16
SLIDE 16

Public distribution 16

◆ 84% of desktop

fingerprints are unique

◆ 42% for the mobile

browsers

Fingerprints Distinctiveness per Device Type

slide-17
SLIDE 17

Public distribution 17

◆ On average, 90%

  • f the attributes

stay identical

◆ Mobile fingerprints

are generally more stable

Fingerprints Stability

slide-18
SLIDE 18

Public distribution 18

◆ Median collection

time of 2.92 seconds

◆ Mobile fingerprints

generally take more time

Fingerprints Collection Time

slide-19
SLIDE 19

Public distribution 19

◆ Median size of

7,550 bytes

◆ Mobile fingerprints

are generally lighter

Fingerprints Size

slide-20
SLIDE 20

Institute of Research and Technology b-com.com

Public distribution 20

Conclusion

slide-21
SLIDE 21

Public distribution 21

Conclusion

Our fingerprints – Are majoritarily unique (>80%) – Are stable (>90% identical attributes) – Only weigh a dozen kilobytes – Are collected in seconds

Our fingerprints of mobile browsers – Show a loss of distinctiveness – Are generally more stable and lighter, but longer to collect

Promising additional web authentication factor

slide-22
SLIDE 22

Thank You

tompoariniaina.andriamilanto@b-com.com

Any question ?

slide-23
SLIDE 23

Institute of Research and Technology b-com.com

Public distribution 23

References

slide-24
SLIDE 24

Public distribution 24

References I

1.

Davide Maltoni, Dario Maio, Anil K. Jain, and Salil Prabhakar. Handbook of Fingerprint

  • Recognition. 1st ed., 2003. https://doi.org/10.1007/b97303.

2.

Vasilios Zorkadis and P. Donos. “On Biometrics‐based Authentication and Identification from a Privacy‐protection Perspective: Deriving Privacy‐enhancing Requirements.” Information Management & Computer Security 12, no. 1 (January 1, 2004): 125–37. https://doi.org/10.1108/09685220410518883.

3.

Marco Gamassi, Massimo Lazzaroni, Mauro Misino, Vincenzo Piuri, Daniele Sana, and Fabio

  • Scotti. “Quality Assessment of Biometric Systems: A Comprehensive Perspective Based on

Accuracy and Performance Measurement.” IEEE Transactions on Instrumentation and Measurement 54, no. 4 (August 2005): 1489–1496. https://doi.org/10.1109/TIM.2005.851087.

4.

Peter Eckersley. “How Unique Is Your Web Browser?” In International Conference on Privacy Enhancing Technologies (PETS), 1–18, 2010. https://doi.org/10.1007/978-3-642-14527-8_1.

slide-25
SLIDE 25

Public distribution 25

References II

5.

Joseph Bonneau. “The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.” In IEEE Symposium on Security and Privacy (S&P), 538–52, 2012. https://doi.org/10.1109/SP.2012.49.

6.

Thomas Unger, Martin Mulazzani, Dominik Frühwirt, Markus Huber, Sebastian Schrittwieser, and Edgar Weippl. “SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting.” In International Conference on Availability, Reliability and Security (ARES), 255–61, 2013. https://doi.org/10.1109/ARES.2013.33.

7.

Jan Spooren, Davy Preuveneers, and Wouter Joosen. “Mobile Device Fingerprinting Considered Harmful for Risk-Based Authentication.” In European Workshop on System Security (EuroSec), 6:1–6:6, 2015. https://doi.org/10.1145/2751323.2751329.

8.

Amin Faiz Khademi, Mohammad Zulkernine, and Komminist Weldemariam. “An Empirical Evaluation of Web-Based Fingerprinting.” IEEE Software 32, no. 4 (July 2015): 46–52. https://doi.org/10.1109/MS.2015.77.

slide-26
SLIDE 26

Public distribution 26

References III

9.

Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, and Felix Freiling. “Fingerprinting Mobile Devices Using Personalized Configurations.” Proceedings on Privacy Enhancing Technologies 2016, no. 1 (2016). https://doi.org/10.1515/popets-2015-0027.

10.

Tom Goethem, Wout Scheepers, Davy Preuveneers, and Wouter Joosen. “Accelerometer-Based Device Fingerprinting for Multi-Factor Mobile Authentication.” In International Symposium on Engineering Secure Software and Systems (ESSoS), 106–121, 2016. https://doi.org/10.1007/978-3-319-30806-7_7.

11.

Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. “Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints.” In IEEE Symposium on Security and Privacy (S&P), 878–94, 2016. https://doi.org/10.1109/SP.2016.57.

12.

Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, et

  • al. “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials.” In

ACM SIGSAC Conference on Computer and Communications Security (CCS), 1421–1434, 2017. https://doi.org/10.1145/3133956.3134067.

slide-27
SLIDE 27

Public distribution 27

References IV

13.

Alejandro Gómez-Boix, Pierre Laperdrix, and Benoit Baudry. “Hiding in the Crowd: An Analysis

  • f the Effectiveness of Browser Fingerprinting at Large Scale.” In The Web Conference

(TheWebConf), 2018. https://doi.org/10.1145/3178876.3186097.

14.

Chun Wang, Steve T.K. Jan, Hang Hu, Douglas Bossart, and Gang Wang. “The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.” In ACM Conference on Data and Application Security and Privacy (CODASPY), 196–203, 2018. https://doi.org/10.1145/3176258.3176332.

15.

Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. “FP-STALKER: Tracking Browser Fingerprint Evolutions.” In IEEE Symposium on Security and Privacy (S&P), 728–41, 2018. https://doi.org/10.1109/sp.2018.00008.

16.

Pierre Laperdrix, Gildas Avoine, Benoit Baudry, and Nick Nikiforakis. “Morellian Analysis for Browsers: Making Web Authentication Stronger With Canvas Fingerprinting.” In Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 43–66, 2019. https://doi.org/10.1007/978-3-030-22038-9_3.

slide-28
SLIDE 28

Public distribution 28

References V

17.

Gaston Pugliese, Christian Riess, Freya Gassmann, and Zinaida Benenson. “Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective.” Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 558–577. https://doi.org/10.2478/popets-2020-0041.