passwords
play

PASSWORDS CS682: Advanced Security Topics Vasiliki Panteli - PowerPoint PPT Presentation

PASSWORDS CS682: Advanced Security Topics Vasiliki Panteli 3/9/2020 Passwords 1 Passwords Passwords is a user authentication mechanism that is widely adopted for many years Methods for user authentication: Something you know


  1. PASSWORDS CS682: Advanced Security Topics Vasiliki Panteli 3/9/2020 Passwords 1

  2. Passwords • Passwords is a user authentication mechanism that is widely adopted for many years • Methods for user authentication: • Something you know (password) • Something you have (mobile phone) • Something you are (biometrics) 3/9/2020 Passwords 2

  3. 1 st Paper: The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Scheme Bonneau J., Herley C., Van Oorschot P. C., Stajano F. 3/9/2020 Passwords 3

  4. 1 st Paper Overview • Introduction • Problem • Proposal • Framework Analysis • Properties • Weights • Schemes Evaluation • Conclusion 3/9/2020 Passwords 4

  5. Introduction – Problem • Passwords are plagued with security problems • Passwords are not replaced by any of the numerous proposals from the research community 3/9/2020 Passwords 5

  6. Introduction – Proposal • The authors propose a framework which provides an evaluation of already proposed password-replacement schemes • It can be used as a benchmark for future password replacement proposals • 25 different properties where tested against 35 password- replacement schemes (9 of them are analyzed in the paper) 3/9/2020 Passwords 6

  7. Framework Analysis - Benefits • Each scheme is rated as either offering or not offering the benefit • Example of “Quasi”: • Memorywise-Effortless: Users of the scheme do not have to remember any secrets at all. • Quasi-Memorywise-Effortless: Users have to remember one secret for everything. • Framework analysis has 3 categories: Usability, Deployability, Security 3/9/2020 Passwords 7

  8. Properties – Usability 1. Memorywise-Effortless 2. Scalable-for-Users 3. Nothing-to-Carry 4. Physically-Effortless 5. Easy-to-Learn 6. Efficient-to-Use 7. Infrequent-Errors 8. Easy-Recovery-from-Loss 3/9/2020 Passwords 8

  9. Properties – Deployability 1. Accessible 2. Negligible-Cost-per-User 3. Server-Compatible 4. Browser-Compatible 5. Mature 6. Non-Proprietary 3/9/2020 Passwords 9

  10. Properties – Security 1. Resilient-to-Physical-Observation 2. Resilient-to-Targeted-Impersonation 3. Resilient-to-Throttled-Guessing 4. Resilient-to-Unthrottled-Guessing 5. Resilient-to-Internal-Observation 3/9/2020 Passwords 10

  11. Properties – Security 6. Resilient-to-Leaks-from-Other-Verifiers 7. Resilient-to-Phishing 8. Resilient-to-Theft 9. No-Trusted-Third-Party 10. Requiring-Explicit-Consent 11. Unlinkable 3/9/2020 Passwords 11

  12. Weights • Some benefits are more important than others depending on the specific goal for which the scheme is being compared STEP1 • Examine and score each individual scheme on each benefit • Compare competing schemes to identify precisely which benefits each offers over the other STEP2 • Determinate a ranking with weights that take into account the relative importance of the benefit STEP3 3/9/2020 Passwords 12

  13. Weights 3/9/2020 Passwords 13

  14. Evaluation – Legacy Passwords ARE ARE NOT 1. Nothing-to-Carry 1. Memory-Effortless 2. Easy-to-Learn 2. Scalable-for-Users 3. Efficient-to-Use 3. Physically-Effortless 4. Easy-Recovery-from-Lost 4. Resilient-to-Physical-Observation 5. Accessible 5. Resilient-to-Throttled-Guessing 6. Negligible-Cost-per-User 6. Resilient-to-Unthrottled-Guessing 7. Server-Compatible 7. Resilient-to-Internal-Observation 8. Browser-Compatible 8. Resilient-to-Leaks-from-Other-Verifiers 9. Mature 9. Resilient-to-Phishing 10.Non-Proprietary 11.Resilient-to-Theft 12.No-Trusted-Third-Party 13.Unlinkable 3/9/2020 Passwords 14

  15. Evaluation – Encrypted password managers: Mozilla Firefox Website 1 password master password Mozilla Firefox Website 2 User password Website 3 password 3/9/2020 Passwords 15

  16. Evaluation – Encrypted password managers: Mozilla Firefox IS IS NOT 1. Scalable-for-Users 1. Easy-Recovery-from-Loss 2. Easy-to-Learn 2. Resilient-to-Throttled-Guessing 3. Efficient-to-Use 3. Resilient-to-Unthrottled-Guessing 4. Infrequent-Errors 4. Resilient-to-Internal-Observation 5. Resilient-to-Phishing 5. Resilient-to-Leaks-from-Other-Verifiers 6. Resilient-to-Theft 6. Browser-Compatible 7. No-Trusted-Third-Party 8. Requiring-Explicit-Consent 9. Unlinkable 10. Negligible-Cost-per-User 11. Mature 12. Accessible 13. Server-Compatible 14. Non-Proprietary 15. Quasi-Memorywise-Effortless 16. Quasi-Nothing-To-Carry 17. Quasi-Physically-Effortless 18. Quasi-Resilient-to-Physical-Observation 19. Quasi-Resilient-to-Targeted-Impersonation 3/9/2020 Passwords 16

  17. Evaluation – Federated Single Sign-On: OpenID Website 1 Single Sign-On Website 2 User Website 3 3/9/2020 Passwords 17

  18. Evaluation – Federated Single Sign-On: OpenID IS IS NOT 1. Scalable-for-Users 1. Server-Compatible 2. Nothing-to-Carry 2. Resilient-to-Internal-Observation 3. Efficient-to-Use 3. Resilient-to-Phishing 4. Infrequent-Errors 4. Unlinkable 5. Easy-Recovery-from-Loss 5. No-Trusted-Third-Party 6. Accessible 7. Negligible-Cost-per-User 8. Mature 9. Non-Proprietary 10. Browser-Compatible 11. Quasi-Memorywise-Effortless 12. Quasi-Physically-Effortless 13. Quasi-Easy-to-Learn 14. Resilient-to-Leaks-from-Other-Verifiers 15. Quasi-Resilient-to-Throttled-Guessing 16. Quasi-Resilient-to-Unthrottled-Guessing 17. Quasi-Resilient-to-Targeted-Impersonation 18. Quasi-Resilient-to-Physical-Observation 3/9/2020 Passwords 18

  19. Evaluation – Graphical Passwords: PCCP User Login 3/9/2020 Passwords 19

  20. Evaluation – Graphical Passwords: PCCP IS IS NOT 1. Easy-to-Learn 1. Memorywise-Effortless 2. Negligible-Cost-per-User 2. Scalable-for-Users 3. Browser-Compatible 3. Accessible 4. Non-Proprietary 4. Server-Compatible 5. Resilient-to-Targeted-Impersonation 5. Mature 6. Resilient-to-Leaks-from-Other-Verifiers 6. Resilient-to-Physical-Observation 7. Resilient-to-Phishing 7. Resilient-to-Unthrottled-Guessing 8. Unlinkable 8. Resilient-to-Internal-Observation 3/9/2020 Passwords 20

  21. Evaluation – Cognitive authentication: GrIDsure 2 4 5 6 4 6 8 0 5 4 Write the pattern Choose a pattern User User 9 6 4 6 7 8 5 4 7 9 5 7 8 0 5 3/9/2020 Passwords 21

  22. Evaluation – Cognitive authentication: GrIDsure IS IS NOT 1. Nothing-to-Carry 1. Memory-Effortless 2. Easy-to-Learn 2. Scalable-for-Users 3. Easy-Recovery-from-Lost 3. Physically-Effortless 4. Negligible-Cost-per-User 4. Accessible 5. Browser-Compatible 5. Server-Compatible 6. Resilient-to-Targeted-Impersonation 6. Mature 7. Resilient-to-Throttled-Guessing 7. Non-Proprietary 8. Resilient-to-Unthrottled-Guessing 8. Resilient-to-Physical-Observation 9. Quasi- Efficient-to-Use 9. Resilient-to-Internal-Observation 3/9/2020 Passwords 22

  23. Evaluation – Other schemes 1. Proxy – Based: URRSA 2. Paper tokens: OTPW 3. Hardware tokens: RSA SecureID 4. Mobile-Phone-based: Phoolproof 5. Biometrics: Fingerprint recognition 3/9/2020 Passwords 23

  24. 3/9/2020 Passwords 24

  25. Conclusions • Most schemes do better than passwords on security • Every scheme does worse than passwords on deployability • This paper can help research community to evaluate their user authentication proposal using this framework and adjusting it to their needs: • Add weights • Add more benefits 3/9/2020 Passwords 25

  26. 2 nd Paper: The Tangled Web of Password Reuse Das, A., Bonneau, J., Caesar, M., Borisov, N., & Wang, X. (2014, February) 3/9/2020 Passwords 26

  27. 2 nd Paper Overview • Introduction • Relative Work • Measurement Study • Survey • Guessing Algorithm • Conclusions 3/9/2020 Passwords 27

  28. Introduction • In this paper the authors: • Estimate the rate of password reuse • Examine how reusing passwords can benefit the attackers • Analyze the similarity of non-identical passwords • Developed a password-guessing algorithm 3/9/2020 Passwords 28

  29. Relative Work • Zhang et al. • Drawback: Their password analysis is based on a single source so they examine one password composition policy • Florencio et al. • Drawback: Only considered identical passwords and not related ones (with modifications) • Weir et al. • Drawback: Focus on cracking passwords in an offline scenario 3/9/2020 Passwords 29

  30. • A typical Internet user estimated to have 25 distinct online account • Users often reuse passwords across accounts on different online service 3/9/2020 Passwords 30

  31. Measurement Study • Understand how often users reuse passwords across sites • Understand the specific approaches the users use to vary their password at different sites • In the measurement study the authors take into consideration the password composition policies 3/9/2020 Passwords 31

  32. Password Composition policies • In order to increase the security over the websites, online services often use composition policies or metrics, as it is proven that they do help users to choose stronger passwords. • Example: • Passwords must not contain the user’s entire name/user ID • At least n characters • Passwords must contain characters from two or more of the following categories: • Uppercase characters • Lowercase characters • Base 10 digits • Non-alphanumeric ASCII characters 3/9/2020 Passwords 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend