Protecting applications with transient authentication

被引:14
作者
Corner, MD [1 ]
Noble, BD [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
PROCEEDINGS OF MOBISYS 2003 | 2003年
关键词
D O I
10.1145/1066116.1066117
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
How does a machine know who is using it? Current systems authenticate their users infrequently, and assume the user's identity does not change. Such persistent authentication is inappropriate for mobile and ubiquitous systems, where associations between people and devices are fluid and unpredictable. We solve this problem with Transient Authentication, in which a small hardware token continuously authenticates the user's presence over a short-range, wireless link. We present the four principles underlying Transient Authentication, and describe two techniques for securing applications. Applications can be protected transparently by encrypting in-memory state when the user departs and decrypting this state when the user returns. This technique is effective, requiring just under 10 seconds to protect and restore an entire machine, but indiscriminate. Instead, applications can utilize an API for Transient Authentication, protecting only sensitive state. We describe our ports of three applications-PGP, SSH, and Mozilla-to this API. Mozilla, the most complicated application we have ported, suffers less than 4% overhead in page loads in the worst case, and in typical use can be protected in less than 250 milliseconds.
引用
收藏
页码:57 / 70
页数:14
相关论文
共 34 条
  • [1] ARBAUGH WA, 2001, P ACISP 2001 SYDN AU
  • [2] ATKINS D, 1996, RFC 1991
  • [3] BLAZE M, 1994, PROCEEDINGS OF THE SUMMER 1994 USENIX CONFERENCE, P27
  • [4] Boneh D, 1996, PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, P91
  • [5] Brands Stefan, 1993, Proceedings of EUROCRYPT, P344, DOI DOI 10.1007/3-540-48285-7_30
  • [6] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [7] CHABAUD F, LINUX SOFTWARE SUSPE
  • [8] Corner M.D., 2002, P 8 ANN INT C MOB CO, P1, DOI [https://doi.org/10.1145/570645.570647, DOI 10.1145/570645.570647]
  • [9] Cowan C, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P63
  • [10] Daemen Joan, 1999, AES PROPOSAL RIJNDAE