A mobile single sign-on system

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
Storage of sensitive data in a Java enabled cell phone MSc Thesis Tommy Egeberg June 2006.
Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and.
Mobile Single Sign On System Souheil Lazghab. The security protocol should secure: First, the Bluetooth communication between the PICDEM FS USB Demo board.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
SM3121 Software Technology Mark Green School of Creative Media.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Windows 2003 and 802.1x Secure Wireless Deployments.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Integrating HPC and the Grid – the STFC experience Matthew Viljoen, STFC RAL EGEE 08 Istanbul.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
TOPPHONEBELGIUM.BE THE PIN CODE DATABASE. TOPPHONEBELGIUM.BE INTRODUCTION TO THE COMPANY TOP PHONE Active in telecom since 1996 Based in Antwerpen but.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
BACK-END FOR MONITORING MESH NETWORK ACTIVITY Ajayi Olabode Oluwaseun Department of Computer Science University of the Western Cape, Private Bag x17, Bellville.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
Single sign-on Secure password store Mats Byfuglien.
Our goal is to make a web based multi-user organizer that can be accessed via cellular devices. There are three main component for this project: A main.
Existing Alternative for Pushing Content to Mobile Devices – an Analysis and an Implementation Diplomityöseminaari Marcus Mattila 49836w.
Adxstudio Portals Training
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
Instructor Materials Chapter 6 Building a Home Network
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Study course: “Computing clusters, grids and clouds” Andrey Y. Shevel
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
THE STEPS TO MANAGE THE GRID
RIM Blackberry at SAP Key Benefits / Survey Results April 2004 SAP IT Enterprise Telecommunication Services.
Reset Kindle To Factory Settings. (Check Here)
Solutions: Backup & Restore
Blockchain Helpline Number
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Guide to Access Control Systems
Scheduler 1.0 By Vipul Sabhaya Udam Dewaraja.
Multifactor Authentication & First Time Login
Getting Started.
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
Getting Started.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
PREPARED BY: RIDDHI PATEL (09CE085)
Two factor Authentication
Architecture Competency Group
Mobile Content Sharing Utilizing the Home Infrastructure
Grid Computing Software Interface
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
ISO Open system Requirements and IT Needs
Microsoft Virtual Academy
Presentation transcript:

A mobile single sign-on system Master thesis 2006 Mats Byfuglien

Outline Conclusion Problem description Project description 11/21/2018 Outline Problem description Project description Research questions Methods Related work The prototype Results Further work Conclusion

11/21/2018 Problem description Most users today have a large number of passwords to manage This often results in: The passwords are written down Easily guessable passwords are used One password used on multiple accounts This reduces the security passwords provide Secure passwords is still a good authentication mechanism SSO proposed as a way to improve password security

11/21/2018 Project description Today there are no mobile SSO solutions on the market supporting automated sign-ins. Develop a functional prototype of a mobile SSO system that handles passwords and supports automatic sign in. A mobile phone with a Java MIDlet handles the management of usernames and passwords Bluetooth/USB unit connected to the PC Conduct a user test Security analysis to find what security measures should be implemented

Research questions 1. What types of single sign-on solutions are available? 2. How secure is the Bluetooth protocol for transferring sensitive data? 3. Is it possible to implement the proposed single sign-on concept? 4. What security mechanisms need to be in place to assure the security of this system? 5. How will this SSO concept be received by the users? 6. Will this SSO concept increase the users’ security level?

Methods Literature study Technical feasibility study 11/21/2018 Methods Literature study Technical feasibility study Develop the prototype User test Scenario Survey Interview Security analysis Adversary modeling

Other SSO solutions A taxonomy lists 4 main categories: 11/21/2018 Other SSO solutions A taxonomy lists 4 main categories: Local pseudo SSO SSO component is on the user's computer Proxy based pseudo SSO The user authenticates once to the proxy and the proxy handles authentication to the services Do not require any changes to the authentication systems True SSO User authenticates to Authentication Service Provider (ASP) once. True SSO solutions are expensive and difficult to configure correctly All systems must support the SSO solution Local true SSO Trused component Proxy based true SSO Kerberos

11/21/2018 The prototype

11/21/2018 Adversary modeling

Results from the security analysis 11/21/2018 Results from the security analysis Four main issues were discovered: Secure the Bluetooth channel Secure protocol on top of Bluetooth protocol Properly authenticate the devices Digital certificates Protect data stored on the mobile phone Encryption Split data on two devices Confirm the integrity of software packages Digitally sign the packages

Results from the user test 11/21/2018 Results from the user test 28 users participated 26 rated the system above average 19 would like to use the system daily 7 did not have an opinion, 2 would not use it 24 believes the system will improve their password management Everyone wanted a backup solution

Further work Implement the proposed security measures 11/21/2018 Further work Implement the proposed security measures Port the code to a smaller device Implement a backup solution Conduct a detailed security analysis when the security measures are implemented Conduct a large scale user test Allow users to test the system over time Include a largerer number of participants

Conclusion It is possible to implement the SSO concept 11/21/2018 Conclusion It is possible to implement the SSO concept The system was well received by the users The system will not provide better security then other SSO solutions Mobility and easy to use functionality (no software or drivers needed) makes the system stand out The solution might apeal to a different group then other SSO solutions Will increase the security level of users who manages passwords manually Enables the user to use more secure passwords

11/21/2018 Questions?