SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

被引:20
作者
Krawiecka, Klaudia [1 ]
Kurnikov, Arseny [1 ]
Paverd, Andrew [1 ]
Mannan, Mohammad [2 ]
Asokan, N. [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Concordia Univ, Montreal, PQ, Canada
来源
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Passwords; Phishing; Intel SGX; Trusted Execution Environment;
D O I
10.1145/3178876.3186101
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-performing all competing solutions in terms of deployability (e.g. cost and compatibility). However, two critical security concerns are phishing and theft of password databases. These are exacerbated by users' tendency to reuse passwords across different services. Current solutions typically address only one of the two concerns, and do not protect passwords against rogue servers. Furthermore, they do not provide any verifiable evidence of their (server-side) adoption to users, and they face deployability challenges in terms of ease-of-use for end users, and/or costs for service providers. We present SafeKeeper, a novel and comprehensive solution to ensure secrecy of passwords in web authentication systems. Unlike previous approaches, SafeKeeper protects users' passwords against very strong adversaries, including external phishers as well as corrupted (rogue) servers. It is relatively inexpensive to deploy as it (i) uses widely available hardware-based trusted execution environments like Intel SGX, (ii) requires only minimal changes for integration into popular web platforms like WordPress, and (iii) imposes negligible performance overhead. We discuss several challenges in designing and implementing such a system, and how we overcome them. Via an 86-participant user study, systematic analysis and experiments, we show the usability, security and deployability of SafeKeeper, which is available as open-source.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 49 条
[21]   Using Trusted Execution Environments for Secure Stream Processing of Medical Data (Case Study Paper) [J].
Segarra, Carlos ;
Delgado-Gonzalo, Ricard ;
Lemay, Mathieu ;
Aublin, Pierre-Louis ;
Pietzuch, Peter ;
Schiavoni, Valerio .
DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2019, 2019, 11534 :91-107
[22]   RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments [J].
Lee, Junmo ;
Kim, Seongjun ;
Park, Sanghyeon ;
Moon, Soo-Mook .
2024 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC, 2024, :456-472
[23]   Comparison of side-channel leakage on Rich and Trusted Execution Environments [J].
Leignac, Paul ;
Potin, Olivier ;
Rigaud, Jean-Baptiste ;
Dutertre, Jean-Max ;
Pontie, Simon .
PROCEEDINGS OF THE SIXTH WORKSHOP ON CRYPTOGRAPHY AND SECURITY IN COMPUTING SYSTEMS CS2 2019, 2016, :19-22
[24]   GuaranTEE: Introducing Control-Flow Attestation for Trusted Execution Environments [J].
Morbitzer, Mathias ;
Kopf, Benedikt ;
Zieris, Philipp .
2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, :547-553
[25]   TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation [J].
Duan, Guoyun ;
Fu, Yuanzhi ;
Zhang, Boyang ;
Deng, Peiyao ;
Sun, Jianhua ;
Chen, Hao ;
Chen, Zhiwen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 144 :192-204
[26]   Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments [J].
Alder, Fritz ;
Van Bulck, Jo ;
Spielman, Jesse ;
Oswald, David ;
Piessens, Frank .
DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (02)
[27]   TC4SE: A High-Performance Trusted Channel Mechanism for Secure Enclave-Based Trusted Execution Environments [J].
Hamidy, Gilang Mentari ;
Yulianti, Sri ;
Philippaerts, Pieter ;
Joosen, Wouter .
INFORMATION SECURITY, ISC 2023, 2023, 14411 :246-264
[28]   Protecting Password Databases using Trusted Hardware [J].
Krawiecka, Klaudia ;
Paverd, Andrew ;
Asokan, N. .
SYSTEX 2016: 1ST WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, 2016,
[29]   Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments [J].
Yang, Cheng-Yun ;
Ramshankar, Gowri ;
Eliopoulos, Nicholas ;
Jajal, Purvish ;
Nambiar, Sudarshan ;
Miller, Evan ;
Zhang, Xun ;
Tian, Dave ;
Chen, Shuo-Han ;
Perng, Chiy-Ferng ;
Lu, Yung-Hsiang .
PROCEEDINGS OF THE 29TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED 2024, 2024,
[30]   Lark: Verified Cross-Domain Access Control for Trusted Execution Environments [J].
Zeng, Fanlang ;
Zhang, Zhuoruo ;
Chang, Rui ;
Yu, Chenyang ;
Zhang, Zijun ;
Zhao, Yongwang .
2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, :160-171