SafeKeeper: Protecting Web Passwords using Trusted Execution Environments

被引:20
作者
Krawiecka, Klaudia [1 ]
Kurnikov, Arseny [1 ]
Paverd, Andrew [1 ]
Mannan, Mohammad [2 ]
Asokan, N. [1 ]
机构
[1] Aalto Univ, Espoo, Finland
[2] Concordia Univ, Montreal, PQ, Canada
来源
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Passwords; Phishing; Intel SGX; Trusted Execution Environment;
D O I
10.1145/3178876.3186101
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Passwords are by far the most widely-used mechanism for authenticating users on the web, out-performing all competing solutions in terms of deployability (e.g. cost and compatibility). However, two critical security concerns are phishing and theft of password databases. These are exacerbated by users' tendency to reuse passwords across different services. Current solutions typically address only one of the two concerns, and do not protect passwords against rogue servers. Furthermore, they do not provide any verifiable evidence of their (server-side) adoption to users, and they face deployability challenges in terms of ease-of-use for end users, and/or costs for service providers. We present SafeKeeper, a novel and comprehensive solution to ensure secrecy of passwords in web authentication systems. Unlike previous approaches, SafeKeeper protects users' passwords against very strong adversaries, including external phishers as well as corrupted (rogue) servers. It is relatively inexpensive to deploy as it (i) uses widely available hardware-based trusted execution environments like Intel SGX, (ii) requires only minimal changes for integration into popular web platforms like WordPress, and (iii) imposes negligible performance overhead. We discuss several challenges in designing and implementing such a system, and how we overcome them. Via an 86-participant user study, systematic analysis and experiments, we show the usability, security and deployability of SafeKeeper, which is available as open-source.
引用
收藏
页码:349 / 358
页数:10
相关论文
共 49 条
[41]   ShuffleFL: Gradient-Preserving Federated Learning using Trusted Execution Environment [J].
Zhang, Yuhui ;
Wang, Zhiwei ;
Cao, Jiangfeng ;
Hou, Rui ;
Meng, Dan .
PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, :161-168
[42]   FairCs-Blockchain-Based Fair Crowdsensing Scheme using Trusted Execution Environment [J].
Liang, Yihuai ;
Li, Yan ;
Shin, Byeong-Seok .
SENSORS, 2020, 20 (11) :1-15
[43]   Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment [J].
da Rocha, Marciano ;
Gomes Valadares, Dalton Cezane ;
Perkusich, Angelo ;
Gorgonio, Kyller Costa ;
Pagno, Rodrigo Tomaz ;
Will, Newton Carlos .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER), 2020, :31-43
[44]   Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach [J].
Zheng, Wei ;
Cao, Yang ;
Tan, Haining .
NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29) :21499-21509
[45]   Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications [J].
Gomes Valadares, Dalton Cezane ;
Will, Newton Carlos ;
Caminha, Jean ;
Perkusich, Mirko Barbosa ;
Perkusich, Angelo ;
Gorgonio, Kyller Costa .
IEEE ACCESS, 2021, 9 :80953-80969
[46]   Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach [J].
Wei Zheng ;
Yang Cao ;
Haining Tan .
Neural Computing and Applications, 2023, 35 :21499-21509
[47]   Memory Auditing for Detection of Compromised Switches in Software-Defined Networks Using Trusted Execution Environment [J].
da Luz Lemos, Filipe Augusto ;
de Faria, Rubens Alexandre ;
Abatti, Paulo Jose ;
Pereira Fonseca, Mauro Sergio ;
Ono Fonseca, Keiko Veronica .
DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, 2020, 152 :77-85
[48]   Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment [J].
Wang, Yong ;
Li, June ;
Zhao, Siyu ;
Yu, Fajiang .
IEEE ACCESS, 2020, 8 :190652-190662
[49]   Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE) [J].
Liu, Chunchi ;
Guo, Hechuan ;
Xu, Minghui ;
Wang, Shengling ;
Yu, Dongxiao ;
Yu, Jiguo ;
Cheng, Xiuzhen .
IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) :3268-3280