SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

被引:20
作者
Krawiecka, Klaudia [1 ]
Kurnikov, Arseny [1 ]
Paverd, Andrew [1 ]
Mannan, Mohammad [2 ]
Asokan, N. [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Concordia Univ, Montreal, PQ, Canada
来源
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Passwords; Phishing; Intel SGX; Trusted Execution Environment;
D O I
10.1145/3178876.3186101
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-performing all competing solutions in terms of deployability (e.g. cost and compatibility). However, two critical security concerns are phishing and theft of password databases. These are exacerbated by users' tendency to reuse passwords across different services. Current solutions typically address only one of the two concerns, and do not protect passwords against rogue servers. Furthermore, they do not provide any verifiable evidence of their (server-side) adoption to users, and they face deployability challenges in terms of ease-of-use for end users, and/or costs for service providers. We present SafeKeeper, a novel and comprehensive solution to ensure secrecy of passwords in web authentication systems. Unlike previous approaches, SafeKeeper protects users' passwords against very strong adversaries, including external phishers as well as corrupted (rogue) servers. It is relatively inexpensive to deploy as it (i) uses widely available hardware-based trusted execution environments like Intel SGX, (ii) requires only minimal changes for integration into popular web platforms like WordPress, and (iii) imposes negligible performance overhead. We discuss several challenges in designing and implementing such a system, and how we overcome them. Via an 86-participant user study, systematic analysis and experiments, we show the usability, security and deployability of SafeKeeper, which is available as open-source.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 49 条
[31]   Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications [J].
Gomes Valadares, Dalton Cezane ;
Will, Newton Carlos ;
Spohn, Marco Aurelio ;
de Souza Santos, Danilo Freire ;
Perkusich, Angelo ;
Gorgonio, Kyller Costa .
CLOSER: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2021, :111-121
[32]   Cloud Key Management using Trusted Execution Environment [J].
Bouamama, Jaouhara ;
Hedabou, Mustapha ;
Erradi, Mohammed .
SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, :560-567
[33]   Mitigating Network Side Channel Leakage for Stream Processing Systems in Trusted Execution Environments [J].
Bilal, Muhammad ;
Alsibyani, Hassan ;
Canini, Marco .
DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, :16-27
[34]   Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case [J].
Cabrera-Gutierrez, Antonio J. ;
Castillo, Encarnacion ;
Escobar-Molero, Antonio ;
Cruz-Cozar, Juan ;
Morales, Diego P. ;
Parrilla, Luis .
ELECTRONICS, 2023, 12 (13)
[35]   TBFT: Efficient Byzantine Fault Tolerance Using Trusted Execution Environment [J].
Zhang, Jiashuo ;
Gao, Jianbo ;
Wang, Ke ;
Wu, Zhenhao ;
Li, Yue ;
Guan, Zhi ;
Chen, Zhong .
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, :1004-1009
[36]   Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography [J].
Bicakci, Kemal ;
Ak, Ihsan Kagan ;
Ozdemir, Betul Askin ;
Gozutok, Mesut .
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, :177-183
[37]   A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment [J].
Akguen, Mete ;
Soykan, Elif Ustundag ;
Soykan, Gurkan .
IEEE ACCESS, 2023, 11 :9182-9196
[38]   Poster: APETEEt - Secure Enforcement of ABAC Policies using Trusted Execution Environment [J].
Godhani, Pritkumar ;
Bharadhwaj, Rahul ;
Sural, Shamik .
PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, :47-49
[39]   TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment [J].
Gao, Mingyuan ;
Dang, Hung ;
Chang, Ee-Chien .
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, :235-247
[40]   Secure and Efficient Decentralized Bitcoin Mixing Scheme using Trusted Execution Environment [J].
Xie, Yankai ;
Wang, Qingtao ;
Li, Songwei ;
Xiao, Ruiyang ;
Zhang, Chi ;
Wei, Lingbo .
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, :4390-4395