An Empirical Analysis of Incorrect Account Remediation in the Case of Broken Authentication

被引:2
作者
Lee, Jeongho [1 ]
Choi, Hyoung-Kee [2 ]
Yoon, Jin Hee [3 ]
Kim, Seongjune [3 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon 16419, South Korea
[2] Sungkyunkwan Univ, Coll Software, Suwon 16419, South Korea
[3] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon 16419, South Korea
关键词
Cyber security; internet security; trust management; broken authentication; account remediation; security measurement;
D O I
10.1109/ACCESS.2023.3343411
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most critical vulnerabilities in authentication, commonly referred to as "broken authentication," poses a harmful threat, leading to the compromise of user credentials and the unauthorized hijacking of sessions. Addressing these security breaches is imperative, necessitating effective remediation mechanisms. Our primary objective is to assess and enhance the security posture of remediation mechanisms by addressing the vulnerabilities associated with broken authentication. Our investigation reveals deficiencies in the implementation of the three prevailing remediation mechanisms across popular Service Providers (SPs), rendering manual remediation attempts futile. We demonstrate our claim by measuring post-compromise security preparedness across over 350 popular websites and applications. During the measurement, SPs were divided into three groups to compare the correctness of the remediation mechanisms across groups. Based on the measurement and evaluation results, we analyzed the root cause of such incorrectness and discussed possible mitigations and practical recommendations to solve the remedial problems. The scope of this study ranges from compromise to the immediate consequences of countermeasures. Hence, discussions of the causes of broken authentication and descriptions of attacks for breaking authentication are beyond the scope of this study. Detailed case studies of four popular SPs are included to discuss their unique reactive prevention behaviors. Observations and their meaningful results challenge us to render remediation mechanisms opaque and difficult to audit, which contributes to underestimating the security threats of ineffective revocations.
引用
收藏
页码:141610 / 141627
页数:18
相关论文
共 73 条
[1]  
Akhawe Devdatta, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P257
[2]   Towards a Formal Foundation of Web Security [J].
Akhawe, Devdatta ;
Barth, Adam ;
Lam, Peifung E. ;
Mitchell, John ;
Song, Dawn .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :290-304
[3]  
Alexa, Top 200 Sites on the Web
[4]  
Amazon, Web Apps vs. Native Apps vs. Hybrid Apps-Difference Between Types of Web and Mobile Applications
[5]  
[Anonymous], 2023, The Record
[6]   Detection of Compromised Online Social Network Account with an Enhanced Knn [J].
Boahen, Edward Kwadwo ;
Wang, Changda ;
Brunel Elvire, Bouya-Moko .
APPLIED ARTIFICIAL INTELLIGENCE, 2020, 34 (11) :777-791
[7]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[8]   Bridging the Gap in Computer Security Warnings: A Mental Model Approach [J].
Bravo-Lillo, Cristian ;
Cranor, Lorrie Faith ;
Downs, Julie S. ;
Komanduri, Saranga .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :18-26
[9]   Sub-session hijacking on the web: Root causes and prevention [J].
Calzavara, Stefano ;
Rabitti, Alvise ;
Bugliesi, Michele .
JOURNAL OF COMPUTER SECURITY, 2019, 27 (02) :233-257
[10]  
Cova M., 2008, WOOT, V8, P1