Secure Fallback Authentication and the Trusted Friend Attack

被引:14
|
作者
Javed, Ashar [1 ]
Bletgen, David [1 ]
Kohlar, Florian [1 ]
Duermuth, Markus [1 ]
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
D O I
10.1109/ICDCSW.2014.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fallback authentication, i.e., recovering access to an account after the password is lost, is an important aspect of real-world deployment of authentication solutions. However, most proposed and deployed mechanisms have substantial weaknesses that seriously degrade security and/or usability. A promising new fallback authentication mechanism is social authentication, which bases authentication on information about the social context of the user (e.g., on his social graph). We consider fallback authentication mechanisms deployed in practice on a number of social network sites (we concentrate on social networks because those can realistically implement social authentication). Our main contribution is a novel attack against Facebook's social authentication mechanism called Trusted Friends, which is the prime example for social authentication. Our attack is different from previous attacks in that it does not exploit bias in user choice but exploits tests that are realized client-side (but should be server-side) and POST-data fields that can be manipulated by an attacker. Furthermore, we found problems with all fallback authentication mechanisms used by social network sites, and demonstrate a number of cases where we can circumvent the schemes used. These findings are problematic as successfully breaking the fallback authentication gives full access to an account, just as breaking the main authentication mechanism. We conclude that implementations of fallback authentication mechanisms require more attention, both on a conceptual and an implementation level, as even seemingly minor implementation details can have a broad impact on the overall security. We have responsibly reported all attacks to the respective security teams well in advance of publication.
引用
收藏
页码:22 / 28
页数:7
相关论文
共 50 条
  • [1] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [2] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [3] A Trusted Third Party Based Secure Authentication Scheme of E-Commerce
    Zhang Longjun
    Zou Tao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 590 - 594
  • [4] Geographical Security Questions for Fallback Authentication
    Addas, Alaadin
    Salehi-Abari, Amirali
    Thorpe, Julie
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 217 - 222
  • [5] Trusted Secure Geographic Routing Protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol
    Shajin, Francis H.
    Rajesh, Paulthurai
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022, 18 (05) : 603 - 621
  • [6] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    Quantum Information Processing, 2014, 13 : 917 - 923
  • [7] Secure authentication watermarking for localization against the Holliman–Memon attack
    Niladri B. Puhan
    Anthony T. S. Ho
    Multimedia Systems, 2007, 12 : 521 - 532
  • [8] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
  • [9] Secure Message Authentication Against Related-Key Attack
    Bhattacharyya, Rishiraj
    Roy, Arnab
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 305 - 324
  • [10] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923