21
Duress Detection for Authentication Attacks Against Multiple Administrators Emil Stefanov UC Berkeley [email protected] u Mikhail Atallah Purdue University [email protected]

Duress Detection for Authentication Attacks Against Multiple Administrators

  • Upload
    lainey

  • View
    35

  • Download
    6

Embed Size (px)

DESCRIPTION

Duress Detection for Authentication Attacks Against Multiple Administrators. Emil Stefanov UC Berkeley [email protected] Mikhail Atallah Purdue University [email protected]. Remedies for Authentication Attacks. Guessing passwords Require strong passwords. Eavesdropping - PowerPoint PPT Presentation

Citation preview

Page 1: Duress Detection for Authentication Attacks Against Multiple  Administrators

Duress Detection for Authentication Attacks

AgainstMultiple AdministratorsEmil StefanovUC Berkeley

[email protected]

uMikhail Atallah

Purdue [email protected]

Page 2: Duress Detection for Authentication Attacks Against Multiple  Administrators

Remedies for Authentication Attacks• Guessing

passwordso Require strong

passwords.• Eavesdropping

o Encrypt traffic (e.g., TSL/SSH).

• Man in the middleo Pre-shared secrets,

certificate based authentication.

• Spywareo Intrusion detection

systems / antivirus• Phishing

o TSL, web filters.• Shoulder surfing

o Common sense.• Physical Coercion

o Duress Detection

Page 3: Duress Detection for Authentication Attacks Against Multiple  Administrators

Physical Coercion• Alice has an account on a server.• To use the server she must log in

with her password.• One day, Oscar

threatens Alice and demands to know her password.

Page 4: Duress Detection for Authentication Attacks Against Multiple  Administrators

Duress Signaling• What should Alice do?

o Provide the correct password?• Oscar wins.

o Refuse to cooperate?• Oscar carries out his threat.

o Provide an invalid password?• Oscar tries the password and determines that Alice refused to cooperate.

o Provide a duress password?• The attacker logs in but unknowingly signals a silent alarm.

Page 5: Duress Detection for Authentication Attacks Against Multiple  Administrators

Duress Password• What should it look like?

o Let’s review a few possibilities.

Page 6: Duress Detection for Authentication Attacks Against Multiple  Administrators

Two-Password Schemes

• Alice has two passwords:o A correct password

• She always uses this one to log in when she is not under duress.

o A duress passwords• She gives this one to Oscar during duress.

• Advantages?o Simple to explain and implement.

• Problems?o Oscar can ask for both passwords Succeeds with

probability .o Alice will likely forget her duress password because she

never uses it.

Page 7: Duress Detection for Authentication Attacks Against Multiple  Administrators

N-Password Schemes• Alice has N passwords:

o One correct password• She always uses this one to log in when she is

not under duress.o N-1 duress passwords

• She gives this one to Oscar during duress.

• Advantages?o Oscar’s probability of success is smaller: .

• Problems?o Alice has to remember passwords, and she never

uses of them! This is not practical.

Page 8: Duress Detection for Authentication Attacks Against Multiple  Administrators

PIN Schemes• Alice has:

o A strong password (e.g., “VHz3xK*bL8”)• This must be correct during normal and duress

authentications.o A PIN (e.g., “8394”)

• Alice uses her PIN for a normal authentication.• She gives Oscar any other PIN during duress.

• Advantages?o Less for Alice to remember.o Oscar’s probability of success is low.

• Problems?o Recall attack – Oscar can ask her to repeat the PIN later.

• Alice might forget the PIN she gave Oscar.o Typos – Easy to mistype a PIN and cause a false alarm.

Page 9: Duress Detection for Authentication Attacks Against Multiple  Administrators

Our Approach• We split the authentication secret into two:

o A strong password – just like usual.o A keyword from a dictionary.

• Carefully choose a keyword dictionary.o Specify requirements.o Give an example.

• Allows for Alice to be an administrator.o Has access to the password/keyword store.o Can intercept network traffic.

• Allows multiple users/administrators.o Alice, Bob, etc.

Page 10: Duress Detection for Authentication Attacks Against Multiple  Administrators

Login Screen

Page 11: Duress Detection for Authentication Attacks Against Multiple  Administrators

Single Administrator Scheme

• A single administrator (Alice) is being attacked.

• Server stores passwords and keywords (hashed & salted).

• Incorrect keyword server notifies authorities.

Page 12: Duress Detection for Authentication Attacks Against Multiple  Administrators

Single Administrator Scheme

• Problem:oOscar gains administrator access.oOscar can verify the keyword.

• Solution:1. The server notifies the authorities.2. The server overwrites the correct

keyword.

Page 13: Duress Detection for Authentication Attacks Against Multiple  Administrators

Single Administrator Scheme

• Not secure for multiple administrators!

• Attack:• Alice and Bob are administrators.• Oscar attacks both of them.• Oscar authenticates as one of them and

checks the keyword of the other one.o Solution?• Our multiple administrator scheme.

Page 14: Duress Detection for Authentication Attacks Against Multiple  Administrators

Multiple Administrator Scheme

• Oscar attacks Alice.• Alice provides a correct password and

an incorrect keyword.• The server receives the credentials.

Page 15: Duress Detection for Authentication Attacks Against Multiple  Administrators

Multiple Administrator Scheme

• Authentication server:o Has purposely “forgotten” the correct

keyword.o Creates a privacy-preserving record.o Sends it to the monitoring server.

Page 16: Duress Detection for Authentication Attacks Against Multiple  Administrators

Multiple Administrator Scheme

• Monitoring server:o Checks the authentication record.o If duress notifies monitoring personnel.

Page 17: Duress Detection for Authentication Attacks Against Multiple  Administrators

Multiple Administrator Scheme

• Monitoring personnel:o Notify the authorities.

• Similar to existing alarm system companies.

Page 18: Duress Detection for Authentication Attacks Against Multiple  Administrators

• Key ideas:oThe authentication server never

knows the correct keyword.oThe monitoring server can only

decrypt duress authentication records.

oKeywords are picked from a carefully selected dictionary (more on this later).

Multiple Administrator Scheme

Page 19: Duress Detection for Authentication Attacks Against Multiple  Administrators

Keyword Dictionary Requirements

• Well definedo Implicitly defined by a topic.oAlice can randomly pick a keyword

by only memorizing the topic.• Hard to make a typo

o Large edit distance between keywords.

Page 20: Duress Detection for Authentication Attacks Against Multiple  Administrators

Keyword Dictionary Example: U.S. States

# Keyword Closest Keyword Edit Distance

1 arkansas kansas 22 kansas arkansas 23 northcarolina southcarolina 24 northdakota southdakota 25 southcarolina northcarolina 26 southdakota northdakota 27 alabama Alaska 3

  …45 rhodeisland louisiana 646 washington michigan 647 newhampshire newmexico 748 connecticut kentucky 849 pennsylvania indiana 850 massachusetts arkansas 9

Page 21: Duress Detection for Authentication Attacks Against Multiple  Administrators

Performance  Authentication

TimeMonitoring

Time1024-bit

Keys 0.203 ms 0.125 ms2048-bit

Keys 0.250 ms 0.671 ms3072-bit

Keys 0.343 ms 2.075 ms4096-bit

Keys 0.468 ms 6.318 ms