A Security Analysis of Two Commercial Browser and Cloud Based Password Managers Rui Zhao 1, Chuan Yue 1, Kun Sun 2 University of Colorado Colorado Springs.

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Akshat Sharma Samarth Shah
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Bradley Cowie, Barry Irwin and Richard Barnett Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING.
An Evaluation of the Google Chrome Extension Security Architecture
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
All Your Browser-saved Passwords Could Belong to Us - A Security Analysis and a Cloud-based New Design By Rui Zhao, Chuan Yue ACM Conference on Data and.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Administrative  Philosophy  Class survey  Grading  Project  Presentation.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Web server security Dr Jim Briggs WEBP security1.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Chapter 13 Network Security. Contents Definition of information security Role of network security Vulnerabilities, threats and controls Network security.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Introduction to Application Penetration Testing
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Introduction to content management systems BTM 395: Internet Programming.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
“Stronger” Web Authentication: A Security Review Cory Scott.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Assorted Topics Introduction AJAX What is it? Why is it important? Examples of live applications Cloud Computing What is it? Why.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Leveraging UICC with Open Mobile API for Secure Applications and Services.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Cross Site Scripting and its Issues By Odion Oisamoje.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
THE DEVIL IS IN THE (IMPLEMENTATION) DETAILS: AN EMPIRICAL ANALYSIS OF OAUTH SSO SYSTEMS SAN-TSAI SUN & KONSTANTIN BEZNOSOV PRESENTED BY: NAZISH KHAN COMPSCI.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Ethical Hacking: Hacking GMail. Teaching Hacking.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
1 Utkarsha MishraCOMPSCI 725 David Silver, Suman Jana, Eric Chen, Collin Jackson, and Dan Boneh. “Password Managers: Attacks and Defenses.” In Proceedings.
Module 7: Designing Security for Accounts and Services.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Jeff Warnock COSC 352 Indiana University of Pennsylvania Spring 2010.
Maninda Edirisooriya. Introduction Extension for Google Chrome. Privacy protection system for online chat. Encrypts chat text using 128 bit AES. Decrypts.
IT Security Awareness Day October 19, 2016
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
Information Security, Theory and Practice.
Angraini, S.Kom, M.Eng Department Information System
Online password manager By: Anthony diveronica
Private and Secure Biometric User Authentication in the Web Master Thesis Defense Zaki Alsubhi Department of Computer Science University of Colorado.
Principal Investigator: Dr. Chuan Yue
Topic 1: Data, information, knowledge and processing
Password Managers: Attacks and Defenses
Extended Authentication Protocol (EAP) Vulnerabilities exploited through Rogue Access Points Stephen Cumella.
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
INTERNET SECURITY.
Presentation transcript:

A Security Analysis of Two Commercial Browser and Cloud Based Password Managers Rui Zhao 1, Chuan Yue 1, Kun Sun 2 University of Colorado Colorado Springs 1 George Mason University ASE/IEEE International Conference on Privacy, Security, Risk and Trust PASSAT’13 Washington D.C. 1

Background Different types of password managers: o Browser’s built-in feature o Browser’s extension o Stand-alone program Our focus: Browser-extension based password managers! 2

Background LastPass on Firefox & Chrome RoboForm on Firefox & Chrome Storage o LastPass stores both locally and remotely o RoboForm stores on either locally or remotely Online mode Offline mode Browser and Cloud based Password Managers (BCPMs) 3

Our Goal Do they well protect users’ passwords? o How do they protect passwords? o Do they have security vulnerabilities? o How severe are those vulnerabilities? 4

Threat Model The types of credentials The types of attackers The types of attacks under consideration 5

Security Analysis Methodology Win 7 platform Open-source in JavaScript: Eclipse IDE De-obfuscation: JS Beautify Other tools o Debug tools on Firefox and Chrome o Network traffic capture tool: HTTP Analyzer 6

Security Analysis Methodology Theoretically estimate the computational effort for performing different attacks o by William Stallings. One microsecond (μs) to perform a basic cryptographic operation One microsecond (μs) to perform a million basic cryptographic operations o DES, AES, SHA-1, SHA-2: a basic cryptographic operation 7

LastPass Security Design and Vulnerability Analysis LastPass-Vul-1 : Outsider Attackers’ Local Decryption Attacks ← insecure design of the master password remembering mechanism in LastPass 8

LastPass Security Design and Vulnerability Analysis LastPass-Vul-2 : Outsider Attackers’ Brute Force Attacks ← insecure design of the local user authentication mechanism and the insecure application of the PBKDF2 function in LastPass 9

LastPass Security Design and Vulnerability Analysis LastPass-Vul-3 : Insider Attackers’ Brute Force Attacks ← insecure association of the master password with authenticators in LastPass 10

LastPass Security Design and Vulnerability Analysis The master password brute force attack effort for LastPass-Vul-2 and LastPass-Vul-3 11

RoboForm Security Design and Vulnerability Analysis RoboForm-Vul-1: Outsider Attackers’ Local Decoding Attacks ← zero protection to local storage when a master password is not used in RoboForm 12 Website Credentials *.rfpEncoding

RoboForm Security Design and Vulnerability Analysis RoboForm-Vul-2: Outsider Attackers’ Brute Force Attacks ← weak protection to local storage when a master password is used in RoboForm 13

RoboForm Security Design and Vulnerability Analysis RoboForm-Vul-3: Insider Attackers’ Server-side Request Monitoring Attacks ← zero protection to the data received by the insiders of RoboForm 14

RoboForm Security Design and Vulnerability Analysis The master password brute force attack effort 15

Likelihood, impact, and overall risk ratings 16 OWASP (Open Web Application Security Project) o Risk rating methodology o Likelihood: how likely this particular vulnerability is to be uncovered and exploited by an attacker. HIGH, MEDIUM, LOW. o Impact: the impact of a successful attack: technical impact, business impact. HIGH, MEDIUM, LOW o Overall Risk Severity: from Likelihood and Impact

Suggestions 1. User data should be protected with confidentiality and authenticity mechanisms before being sent to cloud storage servers o RoboForm-Vul-3 2. Outsider attackers’ client-side stealing capability should be seriously considered o LastPass-Vul-1 o RoboForm-Vul-1 17

Suggestions 3. A master password mechanism must be provided in a BCPM, and users should be mandated to use a strong master password with the strength assured by a pure client-side proactive password checker o RoboForm-Vul-1 o LastPass-Vul-3 o LastPass-Vul-2 o RoboForm-Vul-2 18

Suggestions 4. Large iteration count values should be used in the password based key derivation functions o LastPass-Vul-3 o LastPass-Vul-2 o RoboForm-Vul-2 5. A user’s master password should be used to authenticate a user, but it should not be insecurely associated with any authenticator that will be sent to the cloud storage servers or saved locally to the user’s computer o LastPass-Vul-2 o RoboForm-Vul-2 19

Suggestions 6. Data authenticity should be assured and authenticity verification should not weaken confidentiality o RoboForm-Vul-2 20

Conclusion Define a threat model for analyzing the security of BCPMs Investigate the design and implementation of two very popular commercial BCPMs: LastPass, RoboForm Identify several vulnerabilities of these two BCPMs that could be exploited by outsider and insider attackers to obtain users’ saved website passwords Detailed figures, risk analysis and suggestions are in “Vulnerability and Risk Analysis of Two Commercial Browser and Cloud Based Password Managers” (invited paper), ASE Science Journal, 1(4): pages 1--15,

22