pitfalls in designing zero effort deauthentication
play

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic - PowerPoint PPT Presentation

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks Otto Huhta , Prakash Shrestha , Swapnil Udar , Mika Juuti , Nitesh Saxena and N. Asokan Aalto University University of


  1. Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks Otto Huhta ∗ , Prakash Shrestha † , Swapnil Udar ∗ , Mika Juuti ∗ , Nitesh Saxena † and N. Asokan ‡ ∗ Aalto University † University of Alabama at Birmingham ‡ Aalto University and University of Helsinki NDSS’16, 24 February, San Diego, CA, USA

  2. The deauthentication problem • Threat: • unauthorized access to a terminal • after legitimate user has walked away • What we actually want is zero-effort deauthentication • Both innocent and malicious adversaries Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 2

  3. Zero-effort deauthentication systems • Already in use! • BlueProximity http://sourceforge.net/projects/blueproximity/ • Keyless Entry in high end cars • Based on short-range wireless channels: RSS from user devices Terminal Attacker Legitimate User Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 3

  4. ZEBRA: a recent proposal for deauthentication Targeted for hospital wards, factory f loors, … User may step away from Terminal but lingers nearby Short-range Wireless Channel Bracelet 1b Sensor Data 2 Authenticator: • Compare both sequences Input (Keyboard/Mouse) 1a • Decide “Same User” or “Different User” Accept/Reject 3 Terminal Legitimate User • No user profiling! [1] Mare, et al., “ ZEBRA: Zero-effort bilateral recurring authentication .” IEEE Symposium on Security and Privacy (SP) 2014 http://dx.doi.org/10.1109/SP.2014.51 Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 4

  5. ZEBRA works by averaging out misclassifications [1] Authentication window Actual input sequence (Terminal) MK MK MK MK T T S S T T T T T T T T KM KM KM KM (Bracelet) Predicted input sequence (bracelet) MK MK MK MK MK T T T S T T S T T T T KM KM KM KM KM Window size 10, 8/10 matches ≥ 70% Threshold 70% User remains logged in Bracelet data  classes: 1. (any) typing 2. (any) scrolling 3. m ouse ↔ keyboard movements (MKKM) Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 5

  6. Only interactions seen at Terminal considered [1] Terminal User Input events Input events Interaction Input Events Listener Extractor Actual Interaction Sequence “Same user” Interaction Authenticator Or time “Different user” interval Predicted Interaction Bracelet sequence Segmented Features data Transfer sensor data Accelerometer Feature Interaction & Gyroscope Segmenter Classifier Extractor measurements ZEBRA Engine – Why? User privacy [1], accuracy of classifier? Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 6

  7. ZEBRA vs malicious attackers [1] Authenticator decides Benign Channel “Same user” or 3 “Different user”? Adversary Channel Input (Keyboard/Mouse) by 2 mimicking Victim ’s activities Bracelet 1b Sensor Data 1a Input (Keyboard/Mouse) 4 Accept/Reject Attacker with clear Victim Device Attacked Terminal Victim view/sound of Victim Device – Attacker required to mimic all of victim’s interactions – 20 participants as attackers; researchers as victims • Victims verbally announce their interactions Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 7

  8. Does ZEBRA resist malicious attackers? [1] g = deauthentication at # failed windows Average window length = 6s Fraction of adversaries remaining logged in (window size = 21, threshold=60%) Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 8

  9. Is this a reasonable adversary model? Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 9

  10. More realistic adversary models Interaction Observation devices 1. Naïve all-activity channels – As in Mare et al [1]: mimics all 2. Opportunistic keyboard-only – Mimics selected typing 3. Opportunistic all-activity – Mimics selected activities 4. Audio-only opportunistic KB-only – Mimics selected typing, but no line of sight Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 10

  11. Our implementation of ZEBRA • Implemented end-to-end ZEBRA from scratch • Using off-the-shelf Android Wear smartwatch – Wider applicability: existing affordable models • Re-use ZEBRA parameters/methodology wherever possible Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 11

  12. Parameter comparison Parameter name Original implementation Our implementation Minimum duration 25 ms 25 ms Maximum duration 1 s 1 s Idle threshold 1 s 1 s Window size 21 20 Match threshold 60% 60% Overlap fraction Not reported 0 Grace period 1, 2 1, 2 Classifier Random forest Random forest Classifier training data Form filling Form filling Validation methodology Not reported Leave-one-user-out • Bracelet hardware, datasets used... Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 12

  13. Our implementation Architecture Terminal User Input events Input Events Listener Bracelet Input events Accelerometer & Gyroscope Actual measurement Interaction Same user s Sequence Interaction Or Authenticator Extractor Different Segmented user data Feature Segmenter Extractor Interaction time Predicted interval Interaction Interaction sequence Features time interval Synchronize time, ZEBRA Engine transfer interactions and feature set Features Interaction Communicator Communicator Classifier ZEBRA Engine Android Wear application for smartwatch Matlab Random Forest classifier for interaction classification Java application for Terminal Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 13

  14. Our implementation of ZEBRA (2) Synchronize time, transfer interactions and feature set Zebra/java$ find – name *.java -print | xargs grep –v ” \\\\ ” | grep –v ”1$” | grep –v ”*” | wc – l Zebra/java$ 7706 Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 14

  15. Naïve malicious attackers: comparison g = deauthentication at # failed windows Original malicious attacker (naïve) [1] Our naïve all-activity attacker – 20 participants as victims; researchers as attackers – All attackers are deauthenticated Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 15

  16. ZEBRA does not resist opportunistic malicious attackers g = deauthentication at # failed windows Original malicious attacker (naïve) Our opportunistic KB-only attacker – 20 participants as victims; researchers as attackers – Attackers do not eventually get logged out Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 16

  17. Can still protect against innocent “attackers” g = deauthentication – mismatched traces model at # failed windows innocent attackers – All users eventually deauthenticated – Avg. window length = 14s Mismatched user traces Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 17

  18. What went wrong? [1] 1. Inadequate adversary modeling in [1]! 2. Fundamental design flaw in ZEBRA: ”Authentication based on input source controlled by adversary ” – Attacker controls Terminal: • Can choose type/timing of interactions – A case of tainted input: • Standard fixes https://xkcd.com/327/ Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 18

  19. Strengthening ZEBRA [1] • Recognizing more terminal interactions • Recognizing off-terminal interactions! • Black/whitelisting, sanitizing input • Augmenting with trusted input: RSS Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 19

  20. Take-home message 1. Zero-effort security is appealing – Balance between usability and security – Care in defining adversary model 2. ZEBRA susceptible to opportunistic attackers, still effective for preventing accidental misuse Ask me for a demo! Mika Juuti: Pitfalls in Designing Zero-effort Deauthentication 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend