Authentication with Minimal User Interaction

Size: px
Start display at page:

Download "Authentication with Minimal User Interaction"

Transcription

1 Authentication with Minimal User Interaction Authentication Authentication - Verification of a user, usually through the use of private credentials. What you know - Username/Password combination What you have - Card Who you are Face, Fingerprint, Voice, etc. 1

2 Physical Security Protecting access to physical resources Locked rooms Physical machines Cars Old methods relied on physical locks Security of standard tumbler lock Digital protection of physical resources now more common Challenges of physical access security devices Keys cards Physical Security 2

3 Physical Security Physical realms now more commonly secured with digital resources RFID access cards NFC technology Car Key Fobs Most examples rely on wireless technologies. Problems? Security of wireless? Physical attacks? Zero-Interaction Authentication & Relay Attack Resistance 3

4 Zero-interaction (de)authentication PKES Passive Keyless entry and start Easy-to-use security 7 Zero-interaction (de)authentication Easy-to-use security BlueProximity project in SourceForge Corner and Noble, MobiCom

5 Ghost-and-leech relay attack Leech Kfir and Wool, SecureComm 05 Francillon et al., NDSS 11 Ghost 9 Reader-and-ghost relay attack Drimer and Murdoch, USENIX Security Symposium '

6 Defenses to Relay Attacks Distance Bounding Contextual Co-presence 11 Existing Solution Brands and Chaum, EUROCRYPT 93 Distance bounding *1 light microsecond = 300m Prover Prior security association (e.g., shared key) Verifier minimize Measure RTT 12 6

7 Context Verbal Meaning 13 Contextual Co-Presence Detection (Benign Case) 14 7

8 Contextual Co-Presence Detection (Relay Attack) 15 Environmental Context Examples Acoustic & electromagnetic environment Audio (Au) WiFi (W) Bluetooth (B) GPS Natural physical ambient environment Temperature (T) Humidity (H) Gas Ratio (G) Altitude (Al) T. Halevi et al., ESORICS 2012 J. Krumm and K. Hinckley, UbiComp 2004 A. Varshavsky et al., UbiComp 2007 D. Ma et al., IEEE TDSC

9 Environmental Context Detection Acoustic and RF environment Sensors already available in current smartphones Physical ambient environment Off-the-shelf ambient sensing device -- Sensordrone 17 Acoustic & RF Context Data Collection Device A Device B Client component Server 18 9

10 Natural Context Data Collection 19 Co-Presence Detection Design Machine learning approach Multiboost algorithm pruned J48 Graft/Random Forest as weak learner algorithm ten-fold cross validation Evaluation metrics False Positive Rate (FPR): measure of security False Negative Rate (FNR): measure of usability Performance FNR, FPR, F-measure, and Matthew s correlation coefficient (MCC) 20 10

11 F-Measure Environmental Context Features WiFi, Bluetooth, GPS Jaccard distance Mean of Hamming distance Euclidian distance Mean of exponential of difference Sum of square of ranks Subset count Audio Max cross validation Time frequency distance Temperature, humidity, gas, altitude Hamming distance 22 Acoustic & RF Context Detection Results 1 For all audio-rf combined s 8s 10s 12s 15s 0.75 Time Budget 23 11

12 FPR/FNR F-Measure Natural Context Detection Results T G H Al H-Al H-G-Al T-H-G- Al FNR FPR F-Measure Discussion How do Physical Ambient Modalities compare with other commonly available sensor modalities? Temperature, Humidity, Gas, Pressure/Altitude vs RF Sensors (WIFI, Bluetooth, GPS), Audio 21 12

13 Discussion Availability of sensors 26 Discussion Response Time Sensors for physical parameters are typically faster than common RF sensors 27 13

14 Discussion Battery Power Consumption Low power consumption compared to common RF sensors Minimal influence on the power consumption than RF sensors 28 Discussion Adversarial Settings Changing multiple physical ambient modalities simultaneously will be harder increases the likelihood of being noticed 29 14

15 Discussion Privacy (Location) Privacy Modalities keep on changing 30 Discussion Other Sensors? 31 15

16 Conclusion Co-presence detection based on information collected from multiple different physical ambient sensors Approach for preventing relay attacks Improved security, efficiency & privacy 32 Two-Factor Authentication 16

17 Introduction Password only systems Two Factor Authentication TFA (Password + onetime code) Online guessing attack Offline dictionary attack Many real-world instances Password re-use More than 200,000 of these passwords have reportedly been cracked so far. 36 Current State D = 2^d = Size of a password dictionary t = z = bandwidth of Device to Client channel x = time 37 17

18 Adoption Small user adoption (if TFA optional) Only 25% of Americans use TFA Only 6% of 100k Gmail accounts have TFA enabled So Let s Minimize user-phone interaction QR/Blutooth/Wifi (Shirvanian et al., NDSS 14) USB/NFC Dongles (U2F FIDO Universal 2nd Factor) Sense the environment (Karapanos et al., Usenix 15) 38 LBD/MBD/FBD TFA (Shirvanian et al., NDSS 14) 39 18

19 Main Idea Server stores a hash of the password and a secret s, h=h(p,s) Device stores the secret s Authentication decision based on whether user provides the correct password and owns the device which stores s 40 Protocols Time-based TFA protocol Applicable to all device types (Low, Mid, High Bandwidth) Rely on a clock synchronized with the server Challenge-Response TFA Protocols Symmetric-key and public-key TFA protocols Applicable for devices that receive a challenge and show PIN 41 19

20 Time-Based TFA Protocol 42 Symmetric-Key TFA Protocol 43 20

21 Public-Key TFA Protocol 44 LBD Authentication Phase 45 21

22 MBD Authentication Phase 46 FBD Authentication Phase 47 22

23 Discussion and Conclusion Security: All mechanism provide improved resilience to offline dictionary attacks and online attacks. Challenge-Response protocols are secure against a lunch-time attacker. FBD mechanisms are more secure against online attacks. Usability: There is no time synchronization requirement in Challenge Response mechanisms. In high bandwidth channels user does not need to manually transfer the PIN. Deployability: Traditional and LBD work with a plain browser and no special hardware. 48 U2F FIDO Universal 2nd Factor 49 23

24 About U2F U2F is an open authentication standard that enables internet users to securely access any number of online services, with one single device U2F was created by Google and Yubico, with contribution from NXP, and is today hosted by FIDO Alliance Main Idea The YubiKey requires nothing more than a simple tap or touch: 24

25 The Protocol Protocol Details Challenge-response challenge-response authentication flow, based on public-key cryptography The key pair is generated in the device s tamper-resistant execution environment Phishing and MitM protection the client compiles what it knows about the current HTTP connection this information is then signed by the U2F device and sent to the server Device cloning detection A counter, sent from the device to the server 25

26 Sound Proof (Karapanos et al., Usenix 15) 54 Main Idea Leverage the proximity between user s phone and computer as the second factor Proximity can be verified by: Using local communication channels (phone-computer communication) Sense ambient audio to verify proximity Usable: No user-phone interaction Deployable: Compatible with smartphones and major browsers without plugins Sound-Proof works in a variety of environments, even if the phone is in a pocket or purse 55 26

27 Architecture overview 4. Record 4. Record 5. Calculate Similarity Score s 56 The protocol 57 27

28 Remote Attacker Silence can help the attacker. Silent samples are rejected Attacker wins if samples are similar 58 Co-locator Attacker Similar samples! Attack succeeds Attack trivial if no user-phone interaction 59 28

29 Evaluations Environment: office, office-music, home-tv, lecture room, train station, café Laptop: MacBook Pro Mid 2012, Dell E6510 (using Google Chrome) Phone: iphone 5, Google Nexus 4 Phone position: outside, in pocket, in purse User activity: being silent, talking, coughing, whistling 60 Performance Total time: User clicks login > browser refresh to log the user in Recording time: 3 seconds 61 29

30 Results False Acceptance Rate when the adversary and the victim devices record the same broadcast media. SC-SP stands for same city and same Internet/cable provider, SCDP stands for same city but different Internet/cable providers DC-DP stands for different cities and different Internet/cable providers. A dash in the table means that the TV channel was not available at the victim s location. 62 Discussion 63 30

31 Thank you! Questions? 64 31

epass FIDO -NFC PRODUCT MANUAL

epass FIDO -NFC PRODUCT MANUAL epass FIDO -NFC PRODUCT MANUAL V1.3 2017-03 FEITIAN Technologies Co., Ltd. Website: www.ftsafe.com Overview Feitian epass FIDO -NFC is a FIDO alliance certified U2F authentication key. Unlike the traditional

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

Who What Why

Who What Why Who What Why Board Members Sponsors Associates To Change Authentication Online by: (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b)

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 708 data breaches 82 million personal records stolen $3.5 million average cost per breach 4 We have a PASSWORD

More information

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico 1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become

More information

System-Level Failures in Security

System-Level Failures in Security System-Level Failures in Security Non linear offset component (ms) 0.0 0.5 1.0 1.5 2.0 Variable skew De noised Non linear offset Temperature 26.4 26.3 26.2 26.1 26.0 25.9 25.8 Temperature ( C) Fri 11:00

More information

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives

More information

Breaking FIDO Yubico. Are Exploits in There?

Breaking FIDO Yubico. Are Exploits in There? Breaking FIDO Are Exploits in There? FIDO U2F (Universal 2nd Factor) Analyzing FIDO U2F Attack and Countermeasures Implementation Considerations Resources 2 User Experience 1. Enter username/pwd 2. Insert

More information

Security of NFC payments

Security of NFC payments Security of NFC payments Olga Korobova Department of Computer Science University of Massachusetts Amherst Abstract Our research objective was to examine the security features implemented by the bank cards

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Location Sensing For RFID Sanctuary and Solitude

Location Sensing For RFID Sanctuary and Solitude International Conference on Mathematical Computer Engineering - ICMCE - 2013 390 Location Sensing For RFID Sanctuary and Solitude R.Priya 1,S.Mohamed Yusuff 2,K.Varun 3 1 Trichy Engineering College, Konalai,Trichy-621132,

More information

Addressing Credential Compromise & Account Takeovers: Bearersensitive. Girish Chiruvolu, Ph.D., CISSP, CISM, MBA ISACA NTX April 19

Addressing Credential Compromise & Account Takeovers: Bearersensitive. Girish Chiruvolu, Ph.D., CISSP, CISM, MBA ISACA NTX April 19 Addressing Credential Compromise & Account Takeovers: Bearersensitive OTPS Girish Chiruvolu, Ph.D., CISSP, CISM, MBA ISACA NTX April 19 Impact Across Every Industry Phishing: Low Cost, Big Impact for

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking Optimised to Fail: Card Readers for Online Banking Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org Financial Cryptography

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment. CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How

More information

Securing Internet of things Infrastructure Standard and Techniques

Securing Internet of things Infrastructure Standard and Techniques Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards

More information

Helpdesk Administration Guide Advanced Authentication. Version 6.0

Helpdesk Administration Guide Advanced Authentication. Version 6.0 Helpdesk Administration Guide Advanced Authentication Version 6.0 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION

STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION STEALING PINS VIA MOBILE SENSORS: ACTUAL RISK VERSUS USER PERCEPTION Maryam Mehrnezhad Ehsan Toreini Siamak F. Shahandashti Feng Hao Newcastle University, UK At EuroUSEC, July 2016 JavaScript-based attack

More information

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel. Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations

More information

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function Use this manual if you encounter any problems, or have any questions. Getting started What you can do with the Bluetooth function About voice guidance Supplied accessories Checking the package contents

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

HOST Authentication Overview ECE 525

HOST Authentication Overview ECE 525 Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time

More information

Helpdesk Administration Guide Advanced Authentication. Version 5.6

Helpdesk Administration Guide Advanced Authentication. Version 5.6 Helpdesk Administration Guide Advanced Authentication Version 5.6 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

DIGIPASS SecureClick User manual

DIGIPASS SecureClick User manual DIGIPASS SecureClick User manual DIGIPASS SecureClick Your DIGIPASS SecureClick authenticator is the most convenient way to protect online accounts accessed via your PC or smartphone. It s also FIDO U2F

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Identification Schemes

Identification Schemes Identification Schemes Lecture Outline Identification schemes passwords one-time passwords challenge-response zero knowledge proof protocols Authentication Data source authentication (message authentication):

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017

FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR. All Rights Reserved FIDO Alliance Copyright 2017 FIDO ALLIANCE: UPDATES & OVERVIEW BRETT MCDOWELL EXECUTIVE DIRECTOR 1 250+ MEMBER & PARTNER ORGANIZATIONS GLOBALLY FIDO board members include leading global brands and technology providers + SPONSOR MEMBERS

More information

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function Use this manual if you encounter any problems, or have any questions. Getting started What you can do with the Bluetooth function About voice guidance Supplied accessories Checking the package contents

More information

Optimised to Fail: Card Readers for Online Banking

Optimised to Fail: Card Readers for Online Banking PIN Optimised to Fail: Card Readers for Online Banking SecureBank Inc. login: Vic Tim code: 7365 5748 PIN $20 Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer

More information

TMAS G 120 / G100-RF / G80 Multifunctional Access and Security Terminal

TMAS G 120 / G100-RF / G80 Multifunctional Access and Security Terminal TMAS G 120 / G100-RF / G80 Multifunctional Access and Security Terminal Electronic identification unit for: Attendance control Production control Access control Canteen management Car park management Self-service

More information

Help Guide. Getting started

Help Guide. Getting started Use this manual if you encounter any problems, or have any questions. This Help Guide is also available as a PDF, which can be downloaded here. Getting started What you can do with the BLUETOOTH function

More information

Rethinking Authentication. Steven M. Bellovin

Rethinking Authentication. Steven M. Bellovin Rethinking Authentication Steven M. https://www.cs.columbia.edu/~smb Why? I don t think we understand the real security issues with authentication Our defenses are ad hoc I regard this as a step towards

More information

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. P1L4 Authentication What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource. Authentication: Who are you? Prove it.

More information

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the BLUETOOTH function

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the BLUETOOTH function Top Use this manual if you encounter any problems, or have any questions. Getting started What you can do with the BLUETOOTH function About voice guidance Supplied accessories Checking the package contents

More information

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up

More information

Frequently Asked Questions

Frequently Asked Questions General Where can I find a user guide? When logged in, a user guide can be downloaded from within the client. Help is located in the options tab at the bottom right hand corner of the desktop client and

More information

The Future of Authentication

The Future of Authentication The Future of Authentication Table of Contents Introduction Facial Recognition Liveness Detection and Multimodal Biometrics FIDO: Standards-Based, Password-Free Authentication Biometric Authentication

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

User Authentication. Modified By: Dr. Ramzi Saifan

User Authentication. Modified By: Dr. Ramzi Saifan User Authentication Modified By: Dr. Ramzi Saifan Authentication Verifying the identity of another entity Computer authenticating to another computer Person authenticating to a local/remote computer Important

More information

Google Chromebook Starting Guide

Google Chromebook Starting Guide Google Chromebook Starting Guide Now that you have received your Chromebook you will notice that it looks exactly like a laptop, but there are several differences between both devices. Chromebooks are

More information

Is Password InSecurity Inevitable?

Is Password InSecurity Inevitable? Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols Hugo Krawczyk (IBM Research) Works with Stanislaw Jarecki, Jiayu Xu (UC Irvine) Aggelos Kiayas (U Edinburgh) Nitesh Saxena,

More information

Outline. Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion

Outline. Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion Outline Introduction Background Attack and Analysis Potential Mitigations Discussion and Conclusion Traditional two factor Authentication Traditional two factor Authentication Sound Proof Two factor Authentication

More information

Desktop Application Reference Guide For Windows and Mac

Desktop Application Reference Guide For Windows and Mac Desktop Application Reference Guide For Windows and Mac UNTETHERED LABS, INC. support@gkaccess.com Contents 1. GateKeeper Feature Description... 2 1.1 What is the GateKeeper Desktop Application?... 2 1.2

More information

BlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices.

BlackBerry BlackBerry 10 OS, version continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices. BlackBerry 10.2.1 BlackBerry 10 OS, version 10.2.1 continues to build on the BlackBerry 10 platform for the Z10, Q10 and Z30 devices. PINCH TO PRIORITIZE Don t miss important messages Pinch the Hub to

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

ADOPTING FIDO SearchSecurity

ADOPTING FIDO SearchSecurity E-Guide SearchSecurity T he inability of passwords to keep online accounts secure has been recognized for quite some time, but the IT industry has struggled to establish a practical alternative. PAGE 2

More information

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Data Security and Privacy. Topic 14: Authentication and Key Establishment Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT B

PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT B PRACTICAL PASSWORD AUTHENTICATION ACCORDING TO NIST DRAFT 800-63B MOTIVATION DATABASE LEAKAGE ADOBE 152,982,479 Encrypted with 3DES ECB Same password == same ciphertext https://nakedsecurity.sophos.com/2013/11/04/anatomy-of-a-password-disaster-adobes-giant-sized-cryptographic-blunder/

More information

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy

Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy Cristina Onete CASED & TU Darmstadt cristina.onete@gmail.com Abstract. Distance-bounding protocols address man-in-the-middle

More information

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS

THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS THE FUTURE OF AUTHENTICATION FOR THE INTERNET OF THINGS FIDO ALLIANCE WEBINAR MARCH 28, 2017 1 INTRODUCTION TO THE FIDO ALLIANCE ANDREW SHIKIAR SENIOR DIRECTOR OF MARKETING MARCH 28, 2017 2 THE FACTS ON

More information

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the Bluetooth function Use this manual if you encounter any problems, or have any questions. Getting started What you can do with the Bluetooth function About voice guidance Supplied accessories Checking the package contents

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

Use apps Tap an app to open it. Customize the unit Arrange apps Touch and hold any app on the Home screen, then drag the app around. Drag an app to the edge of the screen to move it to a different Home

More information

Lecture 3 - Passwords and Authentication

Lecture 3 - Passwords and Authentication CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 3 - Passwords and Authentication CSE497b - Spring 2007 Introduction Computer and Network Security Professor

More information

COMPGA12 1 TURN OVER

COMPGA12 1 TURN OVER Applied Cryptography, COMPGA12, 2009-10 Answer ALL questions. 2 hours. Marks for each part of each question are indicated in square brackets Calculators are NOT permitted 1. Multiple Choice Questions.

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

A NEW MODEL FOR AUTHENTICATION

A NEW MODEL FOR AUTHENTICATION All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world

More information

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the BLUETOOTH function

Help Guide. Getting started. Use this manual if you encounter any problems, or have any questions. What you can do with the BLUETOOTH function Use this manual if you encounter any problems, or have any questions. Getting started What you can do with the BLUETOOTH function About voice guidance Supplied accessories Checking the package contents

More information

Lecture 14 Passwords and Authentication

Lecture 14 Passwords and Authentication Lecture 14 Passwords and Authentication Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422 Major Portions Courtesy Ryan Cunningham AUTHENTICATION Authentication

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Logging in. Your teacher will give you a login address during lectures or via .

Logging in. Your teacher will give you a login address during lectures or via  . Logging in Your teacher will give you a login address during lectures or via email. Students usually login as guest. Type your name and click Enter Room. You can also login with your VAMK ID. Write your

More information

ID protocols. Overview. Dan Boneh

ID protocols. Overview. Dan Boneh ID protocols Overview The Setup sk Alg. G vk vk either public or secret User P (prover) Server V (verifier) no key exchange yes/no Applications: physical world Physical locks: (friend-or-foe) Wireless

More information

Mobile Security Fall 2014

Mobile Security Fall 2014 Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate

More information

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Chandra Sekhar Vorugunti 1, Mrudula Sarvabhatla 2 1 Dhirubhai

More information

Near Field Comunications

Near Field Comunications Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range

More information

Help Guide. Getting started

Help Guide. Getting started Use this manual if you encounter any problems, or have any questions. The main update contents of the headset software version 2.0.0 and later are supported. Update the software of the headset and "Sony

More information

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24

Bluetooth mobile solutions APPLICATION NOTE / FAQ. Page 1 on 24 Bluetooth mobile solutions APPLICATION NOTE / FAQ Page 1 on 24 Table of Contents I. Introduction... 5 II. Bluetooth Smart technology General principles... 5 III. Frequently Asked Questions... 5 A. STid

More information

Introduction...1. Authentication Methods...1. Classes of Attacks on Authentication Mechanisms...4. Security Analysis of Authentication Mechanisms...

Introduction...1. Authentication Methods...1. Classes of Attacks on Authentication Mechanisms...4. Security Analysis of Authentication Mechanisms... WHITE PAPER A Security Survey of Strong Authentication Technologies Contents Introduction...1 Authentication Methods...1 Classes of Attacks on Authentication Mechanisms...4 Security Analysis of Authentication

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

FIDO TECHNICAL OVERVIEW. All Rights Reserved FIDO Alliance Copyright 2018

FIDO TECHNICAL OVERVIEW. All Rights Reserved FIDO Alliance Copyright 2018 FIDO TECHNICAL OVERVIEW 1 HOW SECURE IS AUTHENTICATION? 2 CLOUD AUTHENTICATION Risk Analytics Something Device Internet Authentication 3 PASSWORD ISSUES 2 Password might be entered into untrusted App /

More information

Dash Jr. User Manual

Dash Jr. User Manual Dash Jr. User Manual 1 Table of Contents Safety Information...4 Appearance and Key Function...6 Introduction...8 Call Functions...9 Contacts... 11 Messaging... 12 Internet Browser... 13 Bluetooth... 14

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (3 rd Week) 3. User Authentication 3.Outline Electronic User Authentication Principles Password-Based Authentication Token-Based Authentication Biometric

More information

Created by Eugene Stephens ios 8.2

Created by Eugene Stephens ios 8.2 ios 8.2 Physical Buttons - Sleep / Wake Used to turn the device on /off or wake / sleep. Located on the top, right corner (iphone 6 located on right side). - Ring / Silent Used to turn off the ringer.

More information

Dell EMC OpenManage Mobile. Version 3.0 User s Guide (Android)

Dell EMC OpenManage Mobile. Version 3.0 User s Guide (Android) Dell EMC OpenManage Mobile Version 3.0 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

Lecture 3 - Passwords and Authentication

Lecture 3 - Passwords and Authentication Lecture 3 - Passwords and Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12 What is authentication? Reliably verifying

More information

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011 Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

CSCI 667: Concepts of Computer Security

CSCI 667: Concepts of Computer Security CSCI 667: Concepts of Computer Security Lecture 8 Prof. Adwait Nadkarni Derived from slides by William Enck, Micah Sherr, Patrick McDaniel and Peng Ning 1 2 Announcements Project Proposals due Tonight,

More information

Dash 4.0. User Manual

Dash 4.0. User Manual 1 Dash 4.0 User Manual Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth... 10

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.7.0 The owncloud developers October 30, 2018 CONTENTS 1 Release Notes 1 1.1 Changes in 2.7.0............................................. 1 1.2 Changes in 2.6.0.............................................

More information

Dell EMC OpenManage Mobile. Version User s Guide (Android)

Dell EMC OpenManage Mobile. Version User s Guide (Android) Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

Automated Device Pairing for Asymmetric Pairing Scenarios

Automated Device Pairing for Asymmetric Pairing Scenarios Automated Device Pairing for Asymmetric Pairing Scenarios Nitesh Saxena and Md. Borhan Uddin Computer and Information Science Computer and Information Science Polytechnic Institute of New York University

More information

CS530 Authentication

CS530 Authentication CS530 Authentication Bill Cheng http://merlot.usc.edu/cs530-s10 1 Identification vs. Authentication Identification associating an identity (or a claimed identity) with an individual, process, or request

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Information, entertainment, safety, and data gathering - all in one

Information, entertainment, safety, and data gathering - all in one Information, entertainment, safety, and data gathering - all in one Information, entertainment, safety, and data gathering - all in one An all-in one solution, handling messaging, information, entertainment,

More information

nuwire Quick Start Guide

nuwire Quick Start Guide nuwire is a screen sharing application that lets you easily push whatever is on your screen onto other devices. You can share your screen with any Windows, Mac, Android or ios device. You can share with

More information

2 Electronic Passports and Identity Cards

2 Electronic Passports and Identity Cards 2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional

More information

Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts. Jesse Stengel The University of Arizona

Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts. Jesse Stengel The University of Arizona Secure All The Things Using a Yubikey for 2-Factor on (Almost) All Your Accounts Jesse Stengel The University of Arizona What is a Yubikey? Yubikeys are small USB devices made by Yubico for doing various

More information

Universal 2nd Factor (U2F) Overview

Universal 2nd Factor (U2F) Overview Universal 2nd Factor (U2F) Overview FIDO Alliance Proposed Standard 11 April 2017 This version: https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fido-u2f-overview-v1.1-v1.2- ps-20170411.html Editors:

More information

Adversary Models. EECE 571B Computer Security. Konstantin Beznosov

Adversary Models. EECE 571B Computer Security. Konstantin Beznosov Adversary Models EECE 571B Computer Security Konstantin Beznosov 1 why we need adversary models?! attacks and countermeasures are meaningless without 2 2 elements of an adversary model! objectives! obtain

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Mi Home Security Camera Connection Guide. (ios)

Mi Home Security Camera Connection Guide. (ios) Mi Home Security Camera Connection Guide (ios) 1. Navigate to the APP Store with your iphone and search for Mi Home, or scan the QR code below to download and install Mi Home APP. 2. Plug in the Mi Home

More information

Web Security, Summer Term 2012

Web Security, Summer Term 2012 IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Web Security, Summer Term 2012 7 Broken Authentication and Session

More information

Web Security, Summer Term 2012

Web Security, Summer Term 2012 Table of Contents IIG University of Freiburg Web Security, Summer Term 2012 Brocken Authentication and Session Management Dr. E. Benoist Sommer Semester Introduction Examples of Attacks Brute Force Session

More information

WELCOME : OVERVIEW Mobile Applications Testing. Copyright

WELCOME : OVERVIEW Mobile Applications Testing. Copyright WELCOME : OVERVIEW Mobile Applications Testing Copyright NataliaS@portnov.com 1 INTRODUCTION: Mobile APP vs Desktop and WEB Ever since the first cell phone hit the commercial market in 1983, the mobile

More information