TrustTokenF: a Generic Security Framework for Mobile Two-factor Authentication Using TrustZone

被引:7
作者
Zhang, Yingjun [1 ]
Zhao, Shijun [1 ]
Qin, Yu [1 ]
Yang, Bo [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing, Peoples R China
来源
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 | 2015年
基金
中国国家自然科学基金;
关键词
two-factor authentication; Trusted Execution Environment; TrustZone; SRAM PUF; trusted user interaction; TPM2.0 policy-based authorization;
D O I
10.1109/Trustcom.2015.355
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give a detail analysis of the security issues when using mobile devices as a substitution of dedicated hardware tokens in two-factor authentication (2FA) schemes and propose TrustTokenF, a generic security framework for mobile 2FA schemes, which provides comparable security assurance to dedicated hardware tokens, and is more flexible for token management. We first illustrate how to leverage the Trusted Execution Environment(TEE) based on ARM TrustZone to provide essential security features for mobile 2FA applications, i.e., runtime isolated execution and trusted user interaction, which resist software attackers who even compromise the entire mobile OS. We also use the SRAM Physical Unclonable Functions (PUFs) to provide persistent secure storage for the authentication secrets, which achieves both high-level security and low cost. Based on these security features, we design a series of secure protocols for token deployment, migration and device key updating. We also introduce TPM2.0 policy-based authorization mechanism to enhance the security of the interface from outside world into the trusted tokens. Finally, we implement the prototype system on real TrustZone-enabled hardware. The experiment results show that TrustTokenF is secure, flexible, economical and efficient for mobile 2FA applications.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 23 条
  • [1] Ahmad Z., 2013, IEEE 10 INT C AUT TR
  • [2] [Anonymous], 2014, FINANCIAL CRYPTOGRAP
  • [3] Areno M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P1188, DOI 10.1109/TrustCom.2012.255
  • [4] ARM, Building a secure system using trustzone<(R)>technology
  • [5] Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World
    Azab, Ahmed M.
    Ning, Peng
    Shah, Jitesh
    Chen, Quan
    Bhutkar, Rohan
    Ganesh, Guruprasad
    Ma, Jia
    Shen, Wenbo
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 90 - 102
  • [6] Bade S., PDCS 11 OPEN CRYPTOK
  • [7] Buchanan E., 2008, P 15 ACM C COMP COMM
  • [8] Davi L, 2011, LECT NOTES COMPUT SC, V6531, P346
  • [9] G. Inc, GOOGL CLOUD MESS AND
  • [10] GlobalPlatform, TEE CLIENT API SPEC