A mobile single sign-on system Master thesis 2006 Mats Byfuglien.

Slides:



Advertisements
Similar presentations
Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Advertisements

Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Storage of sensitive data in a Java enabled cell phone MSc Thesis Tommy Egeberg June 2006.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Internet Authentication Based on Personal History – A Feasibility Test Ann Nosseir, Richard Connor, Mark Dunlop University of Strathclyde Computer and.
Mobile Single Sign On System Souheil Lazghab. The security protocol should secure: First, the Bluetooth communication between the PICDEM FS USB Demo board.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
SM3121 Software Technology Mark Green School of Creative Media.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Windows 2003 and 802.1x Secure Wireless Deployments.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
TOPPHONEBELGIUM.BE THE PIN CODE DATABASE. TOPPHONEBELGIUM.BE INTRODUCTION TO THE COMPANY TOP PHONE Active in telecom since 1996 Based in Antwerpen but.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
BACK-END FOR MONITORING MESH NETWORK ACTIVITY Ajayi Olabode Oluwaseun Department of Computer Science University of the Western Cape, Private Bag x17, Bellville.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
KAIS T In-Vehicle Secure Wireless Personal Area Network (SWPAN) Reference: S. M. Mahmud and Shobhit Shanker, “In-Vehicle Secure Wireless Personal Area.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Receipt Tracking Assistant Final Presentation Main Presenter: Nicholas Tschohl Project Manager: Edward Denecke May 4, 2005.
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
Single sign-on Secure password store Mats Byfuglien.
Our goal is to make a web based multi-user organizer that can be accessed via cellular devices. There are three main component for this project: A main.
IP-Over-USB Gateway Ben Greenberg Bartosz Mach Adviser: Prof. Vincenzo Liberatore Case Western Reserve University Dept. of Electrical Engineering and Computer.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
3WSDS 3-Way Secure Data Splitting Supervisor: Dr. Talal Alkharobi ABDUL-MOHSIN AL-FARAJ ( ) Hamed Al-Mehdhar ( )
Existing Alternative for Pushing Content to Mobile Devices – an Analysis and an Implementation Diplomityöseminaari Marcus Mattila 49836w.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Adxstudio Portals Training
Web Services Security Patterns Alex Mackman CM Group Ltd
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
Saahithi Chillara Radhika Goyal ECE Fall Senior Design Project.
Wifi Based Menu Ordering By Samiksha Patil Shalini Yethendran Anitta Eaphen.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
Instructor Materials Chapter 6 Building a Home Network
SaaS Application Deep Dive
Study course: “Computing clusters, grids and clouds” Andrey Y. Shevel
Solutions: Backup & Restore
The Internet of Things (IoT)
Blockchain Helpline Number
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Multifactor Authentication & First Time Login
A mobile single sign-on system
Getting Started.
Getting Started.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
PREPARED BY: RIDDHI PATEL (09CE085)
Architecture Competency Group
Mobile Content Sharing Utilizing the Home Infrastructure
ISO Open system Requirements and IT Needs
Presentation transcript:

A mobile single sign-on system Master thesis 2006 Mats Byfuglien

Outline Problem description Project description Research questions Methods Related work The prototype Results Further work Conclusion

Problem description Most users today have a large number of passwords to manage This often results in:  The passwords are written down  Easily guessable passwords are used  One password used on multiple accounts This reduces the security passwords provide Secure passwords is still a good authentication mechanism SSO proposed as a way to improve password security

Project description Today there are no mobile SSO solutions on the market supporting automated sign-ins. Develop a functional prototype of a mobile SSO system that handles passwords and supports automatic sign in.  A mobile phone with a Java MIDlet handles the management of usernames and passwords  Bluetooth/USB unit connected to the PC Conduct a user test Security analysis to find what security measures should be implemented

Research questions 1. What types of single sign-on solutions are available? 2. How secure is the Bluetooth protocol for transferring sensitive data? 3. Is it possible to implement the proposed single sign-on concept? 4. What security mechanisms need to be in place to assure the security of this system? 5. How will this SSO concept be received by the users? 6. Will this SSO concept increase the users’ security level?

Methods Literature study Technical feasibility study  Develop the prototype User test  Scenario  Survey  Interview Security analysis  Adversary modeling

Other SSO solutions A taxonomy lists 4 main categories:  Local pseudo SSO SSO component is on the user's computer  Proxy based pseudo SSO The user authenticates once to the proxy and the proxy handles authentication to the services Do not require any changes to the authentication systems  True SSO User authenticates to Authentication Service Provider (ASP) once. True SSO solutions are expensive and difficult to configure correctly All systems must support the SSO solution  Local true SSO Trused component  Proxy based true SSO Kerberos

The prototype

Adversary modeling

Results from the security analysis Four main issues were discovered:  Secure the Bluetooth channel Secure protocol on top of Bluetooth protocol  Properly authenticate the devices Digital certificates  Protect data stored on the mobile phone Encryption Split data on two devices  Confirm the integrity of software packages Digitally sign the packages

Results from the user test 28 users participated 26 rated the system above average 19 would like to use the system daily  7 did not have an opinion, 2 would not use it 24 believes the system will improve their password management Everyone wanted a backup solution

Further work Implement the proposed security measures Port the code to a smaller device Implement a backup solution Conduct a detailed security analysis when the security measures are implemented Conduct a large scale user test  Allow users to test the system over time  Include a largerer number of participants

Conclusion It is possible to implement the SSO concept The system was well received by the users The system will not provide better security then other SSO solutions Mobility and easy to use functionality (no software or drivers needed) makes the system stand out The solution might apeal to a different group then other SSO solutions Will increase the security level of users who manages passwords manually Enables the user to use more secure passwords

Questions?